Give us your feedback!
Question:
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Response:
Both Technical and Administrative controls
Technical controls
Administrative controls
Physical controls
Which of the following is NOT an example of SSO?
KryptoKnight
LDAP
KErberos
SESAME
Which access control requires sensitivity labels on all subjects and objects?
Manager set control
Role-based access control
Mandatory access control
Access List Control
Discretionary access control
John's computer access changed with his reassignment to a new department. This is an example of:
Need-to-Know control
Owner set access control
Which classification of fuel type is a computer given?
A
B
D
C
Which of the following is NOT a RAW authentication protocol?
PAP
EAP
CHAP
Match the following cryptology tools and technologies
One-time pads
Manual
Still in use in some instances. Recall, one-time pads are the most secure approach
Enigma machine
Electro-mechanical
Electrical lights, mechanical crank/spinwheel
AES, RSA Algorithms
Electronic
I know, you wanted to think "digital" but technically, electronic works as well
Cipherdisks
Mechanical
Think ceasar's spin wheel here
Single photon emissions
Quantum cryptography
used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night
Which access control includes audit trails?
Physical
Technical
Owner
Organizational
Administrative
Which of the following would be the least useful in attempting to crack a password?
brute force/dictionary attack
LophtCrack
John the Ripper
Packet sniffing
MAC the Knife
Which of the following is primarily focused on restoring systems and information?
Corrective
Recovery
Detective
Preventative
Compensating
Which classification of fuel type is wood given?
Clark-Wilson focuses primarily on:
Address Integrity
Availability
Accessibility
Confidentialty
Authentication
Which access control includes training?
Which of the following is primarily focused on identifying violations and incidents?
Which of the following is immediately above the Data Link Layer in the OSI model:
Presentation
Session
Datalink
Network
Transport