Terms and Definitions

You got 10 of 10 possible points.
Your score was: 100 %

Question Results

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 5 of 5

Question:

What is a cryptographic keystream that can only be used once?

Response:

Correct AnswerUser Answer
/one.*time.*pad/iOne time pad
Score 1 of 1

Question:

A LAN is

Response:

a Linear Applebaum Network diagram

a Local Account Name

a Local Area Network

a Least Access Notification

a Local Authentication Node

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

the Westinghouse Address Naming convention

one of the Wilson-Adder Need types

a Wide Array Node

a Wide Area Network

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct