Overall Questions (15 random)

You got 7 of 15 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Threat

incorrect

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Exposure

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

MPLS

ATM

SONET

Frame Relay

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Cost to implement

User acceptance

Rings/Weight change

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Mandatory access control

Access List Control

Role-based access control

Need-to-Know control

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

bus

mesh

ring

2 layer star

star

Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Session

Data Link

Network

Transport

Physical

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Corrective

Recovery

Detective

Deterrent

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Accessibility

Confidentialty

Address Integrity

Authentication

Availability

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

John the Ripper

Packet sniffing

brute force/dictionary attack

MAC the Knife

LophtCrack

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Organizational

Administrative

Physical

Owner

Technical

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the owner

the role

the system

network ACL

the GPO

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Presentation

Session

Datalink

Network

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Recovery

Preventative

Compensating

Corrective

Detective

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

LDAP

PAP

CHAP