Overall Questions (15 random)

You got 18 of 19 possible points.
Your score was: 95 %

Question Results

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

SESAME

KERBEROS

OpenVPN

TACACS

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Preventative

Corrective

Recovery

Deterrent

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

B

A

D

C

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Recovery

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Mandatory access control

Need-to-Know control

Role-based access control

Access List Control

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Finger scanning

Iris Scanning

Badge Scanning

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

20-40%

40-60%

30-50%

60-80%

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SMDS

SONET

MPLS

Frame Relay

ATM

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

10

5

7

8

6

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Address Integrity

Accessibility

Availability

Authentication

Confidentialty

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the GPO

the owner

the system

the role

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Datalink

Presentation

Session

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FAR or Type II error

FRR or Type I error

FRA or Type IV error

CER or Type III error