Give us your feedback!
Question:
Which classification of fuel type is a computer given?
Response:
A
B
C
D
How many levels are there in the latest (June 2013) OSI model?
7
5
10
8
6
Which of the following extinguishing methods is best for a computer or electrical fire?
Water
ESD Blanket
Soda Acid
CO2
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
What is the ideal humidity level for a data center?
40-60%
60-80%
30-50%
20-40%
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Technical controls
Physical Controls
Both Technical and Administrative
Administrative Controls
Which access control includes motion detectors?
Organizational
Administrative
Authentication
Technical
Physical
A WAN is
a Wide Area Network
one of the Wilson-Adder Need types
a Wide Array Node
the Westinghouse Address Naming convention
a Working Authentication Name
Which of the following is the lowest in the OSI model:
Transport
Data Link
Network
Session
Which access control includes asset classification?
Owner
Which of the following have the best CER?
Hand scanning
Iris Scanning
Badge Scanning
Finger scanning
Which access control includes job rotation?
Which of the following is primarily focused on reducing risk?
Corrective
Preventative
Recovery
Detective
Deterrent
Match the following cryptology tools and technologies
One-time pads
Manual
Still in use in some instances. Recall, one-time pads are the most secure approach
Enigma machine
Electro-mechanical
Electrical lights, mechanical crank/spinwheel
AES, RSA Algorithms
Electronic
I know, you wanted to think "digital" but technically, electronic works as well
Cipherdisks
Mechanical
Think ceasar's spin wheel here
Single photon emissions
Quantum cryptography
used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night
Which access control includes cameras?
Visual