Click "Start Quiz" to start your CISSP Quiz.
1.
[Identity and Access Management (IAM)]
What type of attack uses precomputed hash tables to reduce password cracking time?
2.
[Security Assessment and Testing]
What is Xmas Scanning?
3.
[Basic Security Concepts,Security and Risk Management]
What is the definition of "Seclusion"?
4.
[Asset Security]
What is the key responsibility of organizations regarding PII?
5.
[Cryptography,Security Architecture and Engineering]
What is the goal of cryptography that ensures the accuracy and completeness of information, and prevents unauthorized changes to the information?
6.
[Asset Security]
What is included in the definition of assets in the context of data lifecycle management?
7.
[Cryptography,Security Architecture and Engineering]
How is the trapdoor function used in public key encryption?
8.
[Communication and Network Security]
What are the two types of intrusion detection systems?
9.
[Cryptography,Security Architecture and Engineering]
What makes RSA secure?
10.
[Cryptography,Security Architecture and Engineering]
What is the main disadvantage of using symmetric encryption?
11.
[Identity and Access Management (IAM)]
What is the difference between OpenID, SAML, and OAuth?
12.
[Policies, Procedures and Guidelines,Security and Risk Management]
What is the main purpose of security policies in an organization?
13.
[Basic Security Concepts,Security and Risk Management]
What is the difference between Authentication and Authorization?
14.
[Identity and Access Management (IAM)]
What is accountability in access control?
15.
[Cryptography,Security Architecture and Engineering]
What are the two functions of a block cipher during the encryption and decryption process?
16.
[Cryptography,Security Architecture and Engineering]
What is the purpose of hybrid encryption?
17.
[Communication and Network Security]
What is the main vulnerability of PAP in terms of security?
18.
[Identity and Access Management (IAM)]
What is a synchronous token in the context of authentication?
19.
[Policies, Procedures and Guidelines,Security and Risk Management]
What is the difference between standards and baselines in security?
20.
[Asset Security]
What is the definition of Protected Health Information (PHI)?
21.
[Identity and Access Management (IAM)]
What are the three roles in SAML?
22.
[Security Assessment and Testing]
What is test coverage in the context of audits?
23.
[Cryptography,Security Architecture and Engineering]
What are the two main types of cryptosystems that enforce confidentiality?
24.
[Cryptography,Security Architecture and Engineering]
Which of the following asymmetric encryption algorithms is considered to be secure, but slow?
25.
[Communication and Network Security]
What type of protocol is RADIUS?
26.
[Basic Security Concepts,Security and Risk Management]
Which of the following is considered a best practice for maintaining availability?
27.
[Security Assessment and Testing]
What does the status "Open" mean for a port in an nmap scan?
28.
[Security Assessment and Testing]
What is the difference between a blind test and a double-blind test in penetration testing?
29.
[Basic Security Concepts,Security and Risk Management]
Which of the following is an example of AAA in practice?
30.
[Cryptography,Security Architecture and Engineering]
Which symmetric algorithm is a stream-based cipher?
31.
[Basic Security Concepts,Security and Risk Management]
What is the definition of "Privacy"?
32.
[Basic Security Concepts,Security and Risk Management]
What is the definition of "Discretion"?
33.
[Cryptography,Security Architecture and Engineering]
What are some examples of hybrid cryptographic systems?
34.
[Basic Security Concepts,Security and Risk Management]
Which of the following is the most important aspect of AAA (Authentication, Authorization, and Accounting)?
35.
[Asset Security]
What type of encryption protects data in transit?
36.
[Basic Security Concepts,Security and Risk Management]
What is the definition of "Concealment"?
37.
[Security Assessment and Testing]
What does the status "Filtered" mean for a port in an nmap scan?
38.
[Communication and Network Security]
What protocol is used by VoIP for communication and is vulnerable to eavesdropping?
39.
[Asset Security]
What is the purpose of managing the data lifecycle?
40.
[Communication and Network Security]
What is the main difference between IaaS and SaaS?