Give us your feedback!
Question:
What is the ideal humidity level for a data center?
Response:
60-80%
40-60%
30-50%
20-40%
Which of the following is immediately above the Data Link Layer in the OSI model:
Network
Presentation
Session
Transport
Datalink
John's computer access changed with his reassignment to a new department. This is an example of:
Access List Control
Role-based access control
Need-to-Know control
Mandatory access control
Owner set access control
Which of the following is immediately above the Transport Layer in the OSI model:
Which classification of fuel type is wood given?
B
A
C
D
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat
The danger of having a vulnerability exploited
Risk
The probability of a threat being realized
Presence of a vulnerability which exposes the organization
Exposure
Match the following terms and definitions
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Corrective
Intended to bring the environment back to production levels
Recovery
Identify an incidents activities
Alternate measures of control
Compensating
Owner-set permissions are an example of:
Clark-Wilson
role-based access control
mandatory access control
Discretionary access control
Which access control protects the entire system?
System Access Controls
Operating System Controls/Policies
Firewalls/IPS
Access Control Lists
Data Access Controls
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Technical controls
Both Technical and Administrative controls
Physical controls
Administrative controls
Match the following terms to definitions
Training, configuration management of documentation, risk management
Firewalls, IDS, encryption
Lighting, Fencing, guard patrols
Physical Controls
Which classification of fuel type is a computer given?
Which of the following is primarily focused on reducing risk?
Detective
Preventative
Which access control includes asset classification?
Organizational
Administrative
Owner
Physical
Technical
Match the following examples to their definitions
Unpatched servers
A virus that relies on unpatched code or OS levels
The likelihood a threat will be realized, the frequency of natural disasters
$1M dollars per day downtime
A proxy server
Countermeasure