CISSP Study Quiz 2 assesses knowledge on key cybersecurity concepts including biometric systems, access control models, and authentication mechanisms. It prepares learners for CISSP certification, focusing on practical security solutions and attack prevention.
Diffie and Hellman
Clark and Wilson
Bell and LaPadula
Gasser and Lipner
Rate this question:
Data controller
Data handler
Data owner
Data processor
Rate this question:
Bit-level overwrite
Degaussing
Destruction
Shredding
Rate this question:
Content-dependent access control
Context-dependent access control
Role-based access control
Task-based access control
Rate this question:
CHAP
LDAP
PAP
RADIUS
Rate this question:
Integration testing
Installation testing
Acceptance testing
Unit testing
Rate this question:
Acceptance testing
Integration testing
Regression testing
Unit testing
Rate this question:
Install a firewall
Implement encryption
Identify which information is sensitive
Review all user access rights
Rate this question:
Passphrases
Passwords
One-time passwords
Token devices
Rate this question:
Excessive Rights
Excessive Access
Excessive Permissions
Excessive Privileges
Rate this question:
Identifying what the user's job is.
Ensuring that the user alone does not have sufficient rights to subvert an important process.
Determining the minimum set of privileges required for a user to perform their duties.
Restricting the user to required privileges and nothing more.
Rate this question:
A preventive control
A logical control
A corrective control
A compensating control
Rate this question:
UDP
SNMP V1
SNMP V3
SNMP V2
Rate this question:
TCP segment
TCP datagram
TCP frame
TCP packet
Rate this question:
192.168.42.5
192.166.42.5
192.175.42.5
192.1.42.5
Rate this question:
Data link layer
Transport layer
Session layer
Network layer
Rate this question:
PPP
RARP
L2F
ICMP
Rate this question:
Profile-based systems
Pattern matching systems
Misuse detective systems
Rule-based IDS
Rate this question:
Hackers
Industrial saboteurs
Foreign intelligence officers
Employees
Rate this question:
Public
Internal Use Only
Restricted
Confidential
Rate this question:
EAL, Security Target, Target of Evaluation
SFR, Protection Profile, Security Target
Protection Profile, Target of Evaluation, Security Target
SFR, Security Target, Target of Evaluation
Rate this question:
Schema
Relation
Degree
Cardinality
Rate this question:
It requires key recovery of all end user keys
It requires the authentic distribution of the new root CA certificate to all PKI participants
It requires the collection of the old root CA certificates from all the users
It requires issuance of the new root CA certificate
Rate this question:
IaaS
IDaas
PaaS
SaaS
Rate this question:
RSA
ECC
El Gamal
DES
Rate this question:
Kerberos
OpenID
SAML
SESAME
Rate this question:
The Delphi approach
The top-down approach
The bottom-up approach
The technology approach
Rate this question:
Running key cipher
One-time pad
Steganography
Cipher block chaining
Rate this question:
Aggregation
Emanations
Inference
Maintenance Hook
Rate this question:
Attempt to contain and eradicate the malicious activity
Continue the test
Quietly end the test, immediately call the operational IT contact, and escalate the issue
Shut the server down
Rate this question:
Committee of Sponsoring Organizations of the Treadway Commission (COSO)
BIBA
National Institute of Standards and Technology Special Publication 800-66 (NIST SP 800-66)
CCTA Risk Analysis and Management Method (CRAMM)
Rate this question:
Object-Oriented Databases (OODB)
Object-Relational Databases (ORDB)
Relational Databases
Database management systems (DBMS)
Rate this question:
$20,000
40%
7
$10,000
Rate this question:
RAID 1
RAID 5
RAID 0
RAID 3
Rate this question:
DevOps
Sashimi
Spiral
Waterfall
Rate this question:
A data model should exist and all entities should have a significant name.
Justifications must exist for normalized data.
No NULLs should be allowed for primary keys.
All relations must have a specific cardinality.
Rate this question:
Recovery Point Objective (RPO) and Work Recovery Time (WRT)
Recovery Point Objective (RPO) and Mean Time to Repair (MTTR)
Recovery Time Objective (RTO) and Work Recovery Time (WRT)
Recovery Time Objective (RTO) and Mean Time to Repair (MTTR)
Rate this question:
What was the sex of a person and his age
What part of body to be used and how to accomplish identification that is viable
What was the age of a person and his income level
What was the tone of the voice of a person and his habits
Rate this question:
Peer-to-peer authentication
Only server authentication (optional)
Server authentication (mandatory) and client authentication (optional)
Role based authentication scheme
Rate this question:
Reliability
Need-to-know
Auditability
Trustworthiness
Rate this question:
System Administrator
Data Custodian
Security Manager
Data Owner
Rate this question:
Yes, it will pay for itself
Yes, $10,000 is less than the $56,000 ALE
No, the annual TCO is higher than the ALE
No, the annual TCO is lower than the ALE
Rate this question:
Secure compiler warnings
Fuzzing
Static testing
White-box testing
Rate this question:
Sendback systems
Callback forward systems
Callback systems
Sendback forward systems
Rate this question:
Authentication server and PIN codes.
Authentication of clients and static passwords generation.
Authentication of clients and dynamic passwords generation.
Authentication server as well as support for Static and Dynamic passwords.
Rate this question:
Human error
The Windows Operating system
Insecure programming languages
Insecure Transport Protocols
Rate this question:
Data Link
Transport
Presentation
Application
Rate this question:
Views
Tables
Schemas and sub-schemas
Index-sequential tables
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
CISSP Prep Quiz: Domain 1
This quiz contains example questions for the CISSP certification exam. The questions in this quiz were taken from the:
OFFICIAL (ISC)2® GUIDE TO THE CISSP® EXAM
Questions:
18 |
Attempts:
2360 |
Last updated:
Sep 04, 2023
|
Trivia Quiz On CISSP Exam!
Explore key concepts of the CISSP exam through this trivia quiz! Dive into security modes like Dedicated, System high, and Multilevel, enhancing your understanding of federal...
Questions:
29 |
Attempts:
198 |
Last updated:
Mar 20, 2023
|
CISSP Study Quiz
The CISSP Study Quiz is designed to assess knowledge in information security, focusing on business continuity, risk management, and legal frameworks. It prepares learners for the...
Questions:
335 |
Attempts:
2945 |
Last updated:
Mar 21, 2023
|
Highmark- CISSP Initial Skill Set Evaluation
The 'Highmark- CISSP Initial Skill Set Evaluation' assesses foundational skills in network and information security. It evaluates understanding of access controls, authentication...
Questions:
43 |
Attempts:
484 |
Last updated:
Jun 18, 2024
|
|
CISSP- Telecommunications & Networking
This CISSP Telecommunications & Networking quiz assesses knowledge on network defense, Ethernet layers, and intrusion detection placement. It's designed to enhance understanding...
Questions:
15 |
Attempts:
725 |
Last updated:
Mar 21, 2023
|
CISSP- Security Architecture And Design
This CISSP quiz focuses on Security Architecture and Design, assessing knowledge in frameworks like SABSA, ITIL, and standards such as ISO 27001. It covers lifecycle development,...
Questions:
20 |
Attempts:
758 |
Last updated:
Mar 21, 2023
|
|
Wait!
Here's an interesting quiz for you.