Create Quiz

CISSP - ISSEP Information Systems Security Engineering Professional Quiz

CISSP - ISSEP Information Systems Security Engineering Professional Quiz

CISSP - ISSEP Information Systems Security Engineering Professional Quiz Test

You can mute/unmute sounds from here

You May Get Result Of CISSP - ISSEP Information Systems Security Engineering Professional Quiz

Fail
B
A
A+
POST YOUR ANSWER (READ ANSWERS)

Quiz Questions And Answers

What type of power issue results from a prolonged period of low voltage in a data center environment?

Blackouts
Brownouts
Fault
Sags

Renee recently received a digital certificate from a trusted certificate authority. What key does it contain?

Renee’s private key
CA’s public key
CA’s private key
Renee’s public key - Given

What type of fire extinguisher is appropriate for use against an electrical fire in a data center?

Class B
Class A
Class C
Class D

Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key should he use to decrypt the message?

Alice’s private key
Bob’s private key
Bob’s public key
Alice’s public key

Mary is setting up a symmetric encryption system for use in her company. There are currently 50 users. How many keys in total are needed?

98
2,450
1,225
100

Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message?

Alice’s public key
Alice’s private key
Bob’s private key
Bob’s public key

Jason received a message from Bob and would like to be able to prove to a third party that Bob actually sent the message. Which principle of cryptography is Jason attempting to enf

Authentication
Non-repudiation
Confidentiality
Integrity

In what type of attack against databases does an individual combine multiple pieces of information classified at a low level to reveal information classified at a higher level?

Inference
Aggregation
Cross-site scripting
SQL Injection

Tom investigates an attack against a financial system that gleaned very small amounts of money over a long period of time. What type of attack is this?

SQL injection
Salami slicing
Data diddling
Back door

In the Bell-LaPadula model, what property says that a subject may not read information at a higher security level than they possess?

*-integrity rule
*-security rule
Simple integrity rule
Simple security rule
ANSWERS

Currently, we have no comments. Be first to comment on this quiz.

CISSP - ISSEP Information Systems Security Engineering Professional Quiz : Test Trivia

Ultimate impossible accurate personality honest Quiz Game

How do you rate this quiz?

Average rating 4.8 / 5. Vote: 5
Embed This Quiz
Copy the code below to embed this quiz