Overall Questions (15 random)

You got 16 of 19 possible points.
Your score was: 84 %

Question Results

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Technical controls

Administrative controls

Physical controls

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KryptoKnight

LDAP

KErberos

SESAME

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Manager set control

Role-based access control

Mandatory access control

Access List Control

Discretionary access control

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Need-to-Know control

Owner set access control

Role-based access control

Mandatory access control

Access List Control

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

B

D

C

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

EAP

CHAP

LDAP

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Physical

Technical

Owner

Organizational

Administrative

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

LophtCrack

John the Ripper

Packet sniffing

MAC the Knife

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Recovery

Detective

Preventative

Compensating

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

C

B

D

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Address Integrity

Availability

Accessibility

Confidentialty

Authentication

Score 1 of 1

Question:

Which access control includes training?

Response:

Administrative

Physical

Technical

Organizational

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Preventative

Corrective

Detective

Recovery

Compensating

Score 0 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Presentation

Session

Datalink

Network

Transport