Overall Questions (15 random)

You got 12 of 19 possible points.
Your score was: 63 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Address Integrity

Availability

Accessibility

Authentication

Confidentialty

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Wide Array Node

a Wide Area Network

one of the Wilson-Adder Need types

a Working Authentication Name

Score 0 of 1

Question:

What is the ideal humidity level for a data center?

Response:

30-50%

60-80%

20-40%

40-60%

Score 0 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

D

B

C

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Data Link

Network

Session

Physical

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Presentation

Datalink

Network

Session

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

C

B

A

D

Score 1 of 1

Question:

A LAN is

Response:

a Local Authentication Node

a Local Account Name

a Local Area Network

a Least Access Notification

a Linear Applebaum Network diagram

Score 3 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

System Access Controls

Data Access Controls

Operating System Controls/Policies

Access Control Lists

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Authentication

Accessibility

Data Integrity

Availability

Confidentialty

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

SESAME

KryptoKnight

KErberos

LDAP

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

star

ring

2 layer star

bus