Overall Questions (15 random)

You got 7 of 15 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

OpenVPN

KERBEROS

TACACS

SESAME

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

Packet sniffing

John the Ripper

MAC the Knife

LophtCrack

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Iris Scanning

Finger scanning

Badge Scanning

Hand scanning

Score 0 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Accessibility

Data Integrity

Confidentialty

Authentication

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

MPLS

SMDS

SONET

ATM

Score 1 of 1

Question:

A LAN is

Response:

a Least Access Notification

a Local Area Network

a Local Account Name

a Linear Applebaum Network diagram

a Local Authentication Node

Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Physical

Network

Transport

Data Link

Score 0 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

B

A

C

D

Score 1 of 1

Question:

A WAN is

Response:

a Wide Area Network

the Westinghouse Address Naming convention

one of the Wilson-Adder Need types

a Working Authentication Name

a Wide Array Node

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Presentation

Transport

Network

Datalink

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Both technical and administrative controls

Technical controls

Administrative controls

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

A

B

C

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the role

the system

network ACL

the owner