Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Data Link

Session

Application

Network

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

ring

star

mesh

2 layer star

bus

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Network

Transport

Data Link

Session

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Access List Control

Mandatory access control

Owner set access control

Need-to-Know control

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

B

D

C

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Compensating

Preventative

Corrective

Recovery

Detective

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

B

D

C

A

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

D

C

A

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

User acceptance

Initial Registration

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

LophtCrack

John the Ripper

MAC the Knife

Packet sniffing

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Data Link

Network

Transport

Physical

Presentation

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the role

network ACL

the owner

the GPO

the system

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Datalink

Transport

Presentation

Application

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Technical controls

Administrative Controls

Physical Controls

Both Technical and Administrative