Overall Questions (15 random)

You got 11 of 19 possible points.
Your score was: 58 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Manager set control

Mandatory access control

Role-based access control

Access List Control

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

Soda Acid

Water

CO2

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

LophtCrack

brute force/dictionary attack

John the Ripper

Packet sniffing

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Physical

Technical

Administrative

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Compensating

Corrective

Preventative

Recovery

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Fuel/Oxygen

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

A

B

C

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Both Technical and Administrative controls

Physical controls

Technical controls

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Presentation

Datalink

Transport

Network

Application

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Availability

Confidentialty

Accessibility

Authentication

Address Integrity

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Technical

Authentication

Organizational

Administrative

Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Iris Scanning

Finger scanning

Badge Scanning

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

MPLS

Frame Relay

ATM

SMDS

SONET