Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Iris Scanning

Finger scanning

Badge Scanning

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Presentation

Transport

Network

Data Link

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Detective

Corrective

Compensating

Recovery

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Operating System Controls/Policies

Access Control Lists

Firewalls/IPS

System Access Controls

Data Access Controls

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

5

8

7

10

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Mandatory access control

Need-to-Know control

Owner set access control

Access List Control

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

SESAME

KErberos

KryptoKnight

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

OpenVPN

KERBEROS

SESAME

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

C

D

A

B

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

SMDS

ATM

SONET

MPLS

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Compensating

Preventative

Detective

Corrective

Recovery

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Mandatory access control

Access List Control

Discretionary access control

Role-based access control

Manager set control