Click "Start Quiz" to start your CISSP Quiz.
1.
[Communication and Network Security]
What is network convergence?
2.
[Cryptography,Security Architecture and Engineering]
What are the components of a PKI framework?
3.
[Communication and Network Security]
What are some protocols included in the Network layer (Layer 3) of the OSI model?
4.
[Basic Security Concepts,Security and Risk Management]
What is the definition of "Seclusion"?
5.
[Cryptography,Security Architecture and Engineering]
What was the temporary solution proposed as a replacement for DES before AES was deployed?
6.
[Cryptography,Security Architecture and Engineering]
What are the three different types of data discussed in the context of confidentiality?
7.
[Security Assessment and Testing]
What is the purpose of the sampling plan in an audit?
8.
[Security Assessment and Testing]
What are the components of SCAP most directly related to vulnerability assessment?
9.
[Cryptography,Security Architecture and Engineering]
What is the maximum key size for RSA?
10.
[Asset Security]
What is the best way to protect the confidentiality of data in all data states?
11.
[Asset Security]
What is a technical guard solution?
12.
[Asset Security]
What is the purpose of HIPAA regarding PHI?
13.
[Communication and Network Security]
Which of the following is NOT a basic model of cloud computing?
14.
[Security Assessment and Testing]
What is the purpose of log reviews?
15.
[Policies, Procedures and Guidelines,Security and Risk Management]
What is the difference between an organizational security policy and a system-specific security policy?
16.
[Identity and Access Management (IAM)]
What type of authentication methods can use certificates for authentication of computers and users?
17.
[Basic Security Concepts,Security and Risk Management]
Which of the following is the most important aspect of AAA (Authentication, Authorization, and Accounting)?
18.
[Cryptography,Security Architecture and Engineering]
What is the name of the algorithm chosen as AES?
19.
[Identity and Access Management (IAM)]
What is a synchronous token in the context of authentication?
20.
[Basic Security Concepts,Security and Risk Management]
What is the definition of "Secrecy"?
21.
[Basic Security Concepts,Security and Risk Management]
Which of the following is considered a best practice for maintaining integrity?
22.
[Identity and Access Management (IAM)]
What is identity management as a service (IDaaS)?
23.
[Security Assessment and Testing]
What is Xmas Scanning?
24.
[Basic Security Concepts,Security and Risk Management]
What is the definition of "Privacy"?
25.
[Cryptography,Security Architecture and Engineering]
What are the three components of El Gamal encryption?
26.
[Basic Security Concepts,Security and Risk Management]
What is the definition of "Sensitivity"?
27.
[Policies, Procedures and Guidelines,Security and Risk Management]
What is the main purpose of security policies in an organization?
28.
[Identity and Access Management (IAM)]
What is the mechanism used by asynchronous token devices in authentication?
29.
[Identity and Access Management (IAM)]
Can a person be both a subject and an object in access control?
30.
[Asset Security]
What is the goal of discovery capabilities in DLP solutions?
31.
[Basic Security Concepts,Security and Risk Management]
A company's IT department discovers that an employee has been sending sensitive company information to a competitor. This is an example of which of the following?
32.
[Cryptography,Security Architecture and Engineering]
How many keys does DES use?
33.
[Communication and Network Security]
What is the main vulnerability of PAP in terms of security?
34.
[Security Assessment and Testing]
What is the purpose of vulnerability scans and assessments?
35.
[Communication and Network Security]
What is the main difference between IaaS and SaaS?
36.
[Policies, Procedures and Guidelines,Security and Risk Management]
What is the difference between standards and baselines in security?
37.
[Cryptography,Security Architecture and Engineering]
What is RSA?
38.
[Basic Security Concepts,Security and Risk Management]
What are the main benefits of implementing AAA in an organization?
39.
[Cryptography,Security Architecture and Engineering]
Is DES still used today?
40.
[Asset Security]
What is the highest classification for government data?