Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

bus

star

2 layer star

ring

mesh

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the role

the owner

the system

network ACL

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Session

Data Link

Application

Transport

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Organizational

Technical

Owner

Administrative

Physical

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

A

C

B

D

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

D

A

C

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Both technical and administrative controls

Technical controls

Administrative controls

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Diffe-Hillman's Axiom

Moore's Law

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Presentation

Datalink

Network

Session

Transport

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

C

D

A

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Datalink

Session

Presentation

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

brute force/dictionary attack

Packet sniffing

LophtCrack

John the Ripper

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Preventative

Detective

Corrective

Recovery

Compensating

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Owner

Organizational

Technical

Physical

Techincal