Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

MPLS

Frame Relay

ATM

SONET

SMDS

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Diffe-Hillman's Axiom

Moore's Law

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

A

D

C

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Physical

Owner

Organizational

Administrative

Technical

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Detective

Corrective

Preventative

Recovery

Compensating

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Network

Presentation

Datalink

Transport

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Authentication

Availability

Confidentialty

Accessibility

Data Integrity

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

CHAP

PAP

EAP

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authorization

Authentication

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Both technical and administrative controls

Technical controls

Administrative controls

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

30-50%

20-40%

60-80%

40-60%

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Corrective

Recovery

Preventative

Detective

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Threat

incorrect

A virus that relies on unpatched code or OS levels

Vulnerability

incorrect

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Transport

Datalink

Presentation

Network

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Access List Control

Mandatory access control

Need-to-Know control

Owner set access control