Overall Questions (15 random)

You got 14 of 15 possible points.
Your score was: 93 %

Question Results

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

LDAP

CHAP

EAP

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Organizational

Technical

Owner

Physical

Administrative

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Session

Transport

Network

Data Link

Physical

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Organizational

Administrative

Technical

Authentication

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Detective

Corrective

Compensating

Recovery

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

B

D

C

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

one of the Wilson-Adder Need types

a Wide Area Network

a Working Authentication Name

a Wide Array Node

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Physical

Administrative

Technical

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authorization

Authentication

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Soda Acid

CO2

Water

ESD Blanket

Score 1 of 1

Question:

Which classification of fuel type is grease given?

Response:

C

D

A

B

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Deterrent

Detective

Recovery

Corrective

Preventative

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Data Access Controls

Operating System Controls/Policies

Firewalls/IPS

Access Control Lists

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Administrative

Technical

Organizational

Physical

Owner