Overall Questions (15 random)

You got 14 of 15 possible points.
Your score was: 93 %

Question Results

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Rijndael's Challenge

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Owner

Administrative

Techincal

Physical

Technical

Organizational

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

C

B

D

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

EAP

CHAP

LDAP

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

C

A

B

D

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

Water

ESD Blanket

Soda Acid

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Iris Scanning

Hand scanning

Badge Scanning

Finger scanning

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Technical controls

Administrative Controls

Both Technical and Administrative

Physical Controls

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FRA or Type IV error

FAR or Type II error

FRR or Type I error

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Network

Physical

Transport

Session

Data Link

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Retinal imagery

Hand shape/pattern

Voice

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

A

C

D

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Administrative controls

Physical controls

Both Technical and Administrative controls