Overall Questions (15 random)

You got 7 of 15 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Presentation

Physical

Data Link

Network

Transport

Score 0 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Visual

Organizational

Technical

Physical

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Technical

Organizational

Administrative

Owner

Physical

Techincal

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Rijndael's Challenge

Diffe-Hillman's Axiom

Moore's Law

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Technical controls

Administrative Controls

Physical Controls

Both Technical and Administrative

Score 0 of 1
(skipped)

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

incorrect

Entity that can exploit a vulnerability

incorrect

The danger of having a vulnerability exploited

incorrect

The probability of a threat being realized

incorrect

Presence of a vulnerability which exposes the organization

incorrect
Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Accessibility

Address Integrity

Availability

Authentication

Confidentialty

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Presentation

Datalink

Network

Transport

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Transport

Physical

Data Link

Session

Network

Score 0 of 1
(skipped)

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

incorrect

Firewalls, IDS, encryption

incorrect

Lighting, Fencing, guard patrols

incorrect
Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Access Control Lists

Firewalls/IPS

System Access Controls

Operating System Controls/Policies

Data Access Controls

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Owner

Organizational

Technical

Administrative

Physical

Score 1 of 1

Question:

Which access control includes training?

Response:

Technical

Physical

Administrative

Organizational

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KErberos

SESAME

KryptoKnight

LDAP