Give us your feedback!
Question:
Which of the following is a remote authentication system?
Response:
SESAME
KERBEROS
OpenVPN
TACACS
Which of the following is primarily focused on reducing risk?
Detective
Preventative
Corrective
Recovery
Deterrent
Which classification of fuel type is paper given?
B
A
D
C
Match the following control types to their purposes
Reducing Risk
Correcting violations and incidents
Corrective controls also help improve existing preventative and detective controls
Discouraging violations
Providing alternate ways of accomplishing a task
Compensating
Restoring systems and information
John's computer access changed with his reassignment to a new department. This is an example of:
Owner set access control
Mandatory access control
Need-to-Know control
Role-based access control
Access List Control
Match the following cryptology tools and technologies
One-time pads
Manual
Still in use in some instances. Recall, one-time pads are the most secure approach
Enigma machine
Electro-mechanical
Electrical lights, mechanical crank/spinwheel
AES, RSA Algorithms
Electronic
I know, you wanted to think "digital" but technically, electronic works as well
Cipherdisks
Mechanical
Think ceasar's spin wheel here
Single photon emissions
Quantum cryptography
used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night
Which of the following have the best CER?
Hand scanning
Finger scanning
Iris Scanning
Badge Scanning
What is the ideal humidity level for a data center?
20-40%
40-60%
30-50%
60-80%
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
SMDS
SONET
MPLS
Frame Relay
ATM
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
Exposure
A proxy server
Countermeasure
How many levels are there in the latest (June 2013) OSI model?
10
5
7
8
6
Clark-Wilson focuses primarily on:
Address Integrity
Accessibility
Availability
Authentication
Confidentialty
In MAC the access policy is set by:
network ACL
the GPO
the owner
the system
the role
Which of the following is immediately above the Transport Layer in the OSI model:
Network
Datalink
Presentation
Session
Falsely rejecting an authorized user is:
FAR or Type II error
FRR or Type I error
FRA or Type IV error
CER or Type III error