Overall Questions (15 random)

You got 6 of 15 possible points.
Your score was: 40 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

A

D

B

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

CHAP

EAP

PAP

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

Frame Relay

SONET

ATM

MPLS

SMDS

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Firewalls/IPS

Access Control Lists

Operating System Controls/Policies

Data Access Controls

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

ring

bus

mesh

star

Score 0 of 1
(skipped)

Question:

Which classification of fuel type is a computer given?

Response:

C

B

A

D

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the owner

the GPO

the role

the system

network ACL

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

30-50%

40-60%

60-80%

20-40%

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

CER or Type III error

FRA or Type IV error

FAR or Type II error

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Organizational

Technical

Physical

Owner

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

SESAME

KryptoKnight

KErberos

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Owner

Technical

Physical

Techincal

Administrative

Organizational

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Physical

Administrative

Technical

Organizational

Owner

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct