Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Ear shape/pattern

Hand shape/pattern

Retinal imagery

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Administrative

Organizational

Authentication

Technical

Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Recovery

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Preventative

incorrect

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

SONET

SMDS

MPLS

ATM

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Network

Presentation

Datalink

Application

Transport

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Exposure

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

LDAP

PAP

CHAP

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Technical

Physical

Administrative

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Preventative

Deterrent

Detective

Recovery

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

C

B

D

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Administrative

Physical

Technical

Organizational

Owner

Score 1 of 1

Question:

A LAN is

Response:

a Local Area Network

a Least Access Notification

a Linear Applebaum Network diagram

a Local Authentication Node

a Local Account Name

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

User acceptance

Rings/Weight change

Cost to implement

Initial Registration