Give us your feedback!
Question:
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Response:
Both Technical and Administrative
Physical Controls
Administrative Controls
Technical controls
In MAC the access policy is set by:
the role
the GPO
network ACL
the system
the owner
How many levels are there in the latest (June 2013) OSI model?
10
7
5
8
6
Which classification of fuel type is paper given?
C
B
D
A
Which of the following are the three components of the fire triangle?
Fire/Combustion/Oxygen
Heat/Combustion/Oxygen
Heat/Fuel/Oxygen
Fire/Fuel/Oxygen
Determining whether a subject can log into a system is an example of
Authentication
Authorization
Accountability
Which access control includes intrusion detection?
Administrative
Organizational
Owner
Techincal
Technical
Physical
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Risk
The probability of a threat being realized
Exposure
Presence of a vulnerability which exposes the organization
Threat
Which of the following is primarily focused on restoring systems and information?
Preventative
Compensating
Corrective
Recovery
Detective
Which access control protects the entire system?
Firewalls/IPS
Data Access Controls
System Access Controls
Operating System Controls/Policies
Access Control Lists
Which of the following is primarily focused on identifying alternate solutions to achieve a task?
Which classification of fuel type is a computer given?
A LAN is
a Local Account Name
a Local Authentication Node
a Linear Applebaum Network diagram
a Least Access Notification
a Local Area Network
What is the ideal humidity level for a data center?
20-40%
60-80%
40-60%
30-50%
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
SONET
MPLS
SMDS
Frame Relay
ATM