Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Physical

Organizational

Technical

Owner

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

CER or Type III error

FAR or Type II error

FRA or Type IV error

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

SONET

ATM

Frame Relay

MPLS

SMDS

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Authentication

Accountability

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

C

A

B

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Access List Control

Discretionary access control

Mandatory access control

Manager set control

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

KERBEROS

OpenVPN

SESAME

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Operating System Controls/Policies

Access Control Lists

Firewalls/IPS

Data Access Controls

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Risk

incorrect

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Iris Scanning

Hand scanning

Badge Scanning

Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Compensating

incorrect

Correcting violations and incidents

Compensating

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

A LAN is

Response:

a Local Authentication Node

a Least Access Notification

a Local Account Name

a Linear Applebaum Network diagram

a Local Area Network

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Technical

Physical

Organizational