Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Administrative

Organizational

Owner

Physical

Technical

Score 1 of 1

Question:

A WAN is

Response:

a Wide Array Node

one of the Wilson-Adder Need types

a Working Authentication Name

the Westinghouse Address Naming convention

a Wide Area Network

Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

mandatory access control

role-based access control

Discretionary access control

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Datalink

Network

Presentation

Application

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Presentation

Data Link

Transport

Network

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Detective

Compensating

Recovery

Corrective

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Datalink

Transport

Presentation

Network

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Both Technical and Administrative

Technical controls

Administrative Controls

Physical Controls

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Cost to implement

User acceptance

Rings/Weight change

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

B

A

C

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Transport

Application

Presentation

Datalink

Network

Score 0 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Administrative

Physical

Organizational