Overall Questions (15 random)

You got 19 of 19 possible points.
Your score was: 100 %

Question Results

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

8

6

10

5

7

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Preventative

Corrective

Deterrent

Recovery

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the system

the owner

network ACL

the role

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Cost to implement

Rings/Weight change

User acceptance

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

D

C

B

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FRR or Type I error

FRA or Type IV error

FAR or Type II error

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Transport

Network

Presentation

Physical

Data Link

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Physical

Transport

Data Link

Session

Network

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Data Integrity

Accessibility

Authentication

Availability

Confidentialty

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Technical

Organizational

Authentication

Physical

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

John the Ripper

LophtCrack

MAC the Knife

Packet sniffing