Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Detective

Preventative

Recovery

Compensating

Corrective

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Presentation

Transport

Datalink

Network

Session

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Firewalls/IPS

Data Access Controls

Access Control Lists

Operating System Controls/Policies

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Exposure

incorrect

A virus that relies on unpatched code or OS levels

Vulnerability

incorrect

The likelihood a threat will be realized, the frequency of natural disasters

Threat

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

John the Ripper

LophtCrack

brute force/dictionary attack

Packet sniffing

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

8

7

10

5

6

Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Application

Session

Data Link

Network

Transport

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Both Technical and Administrative controls

Physical controls

Technical controls

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

B

C

A

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

B

A

C

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

MPLS

ATM

SONET

SMDS