Give us your feedback!
Question:
Which of the following is immediately above the Transport Layer in the OSI model:
Response:
Presentation
Session
Datalink
Network
What is the ideal humidity level for a data center?
60-80%
40-60%
20-40%
30-50%
Which access control includes intrusion detection?
Administrative
Organizational
Owner
Technical
Techincal
Physical
Owner-set permissions are an example of:
Clark-Wilson
role-based access control
Discretionary access control
mandatory access control
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Technical controls
Lighting, Fencing, guard patrols
Physical Controls
Match the following control types to their purposes
Reducing Risk
Deterrent
Correcting violations and incidents
Recovery
Corrective controls also help improve existing preventative and detective controls
Discouraging violations
Providing alternate ways of accomplishing a task
Compensating
Restoring systems and information
Which of the following would be the least useful in attempting to crack a password?
LophtCrack
MAC the Knife
brute force/dictionary attack
John the Ripper
Packet sniffing
Which classification of fuel type are electrical fires given?
B
A
D
C
Which of the following have the best CER?
Iris Scanning
Hand scanning
Badge Scanning
Finger scanning
Determining whether a subject can log into a system is an example of
Authentication
Authorization
Accountability
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
MPLS
ATM
SONET
SMDS
Frame Relay
Which of the following is primarily focused on reducing risk?
Detective
Preventative
Corrective
Falsely rejecting an authorized user is:
FRA or Type IV error
FRR or Type I error
FAR or Type II error
CER or Type III error
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Both technical and administrative controls
Physical controls