Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

Soda Acid

Water

CO2

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Organizational

Technical

Administrative

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

star

ring

bus

mesh

2 layer star

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Organizational

Administrative

Technical

Physical

Owner

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Physical

Technical

Organizational

Owner

Techincal

Administrative

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

a Wide Area Network

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

a Wide Array Node

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Access Control Lists

Operating System Controls/Policies

Data Access Controls

System Access Controls

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Physical

Data Link

Session

Network

Transport

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Deterrent

Preventative

Recovery

Corrective

Detective

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Transport

Session

Application

Data Link

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Authentication

Technical

Administrative

Organizational

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct