Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Ear shape/pattern

Voice

Retinal imagery

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Rijndael's Challenge

Moore's Law

Kerckhoff's Principle

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FAR or Type II error

FRR or Type I error

CER or Type III error

FRA or Type IV error

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

the Westinghouse Address Naming convention

a Wide Array Node

a Wide Area Network

one of the Wilson-Adder Need types

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

B

C

A

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

Discretionary access control

Clark-Wilson

role-based access control

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

C

A

D

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

brute force/dictionary attack

John the Ripper

LophtCrack

Packet sniffing

Score 1 of 1

Question:

A LAN is

Response:

a Local Area Network

a Linear Applebaum Network diagram

a Least Access Notification

a Local Authentication Node

a Local Account Name

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Address Integrity

Availability

Confidentialty

Authentication

Accessibility

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Corrective

Detective

Compensating

Recovery

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Mandatory access control

Discretionary access control

Role-based access control

Access List Control

Manager set control

Score 0 of 1

Question:

Which access control includes cameras?

Response:

Physical

Organizational

Visual

Technical

Administrative

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Organizational

Physical

Technical

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Threat agent

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect