Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Physical

Organizational

Technical

Visual

Administrative

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

User acceptance

Initial Registration

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Hand shape/pattern

Retinal imagery

Ear shape/pattern

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

CO2

Water

Soda Acid

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

A

C

B

Score 1 of 1

Question:

Which classification of fuel type is grease given?

Response:

C

D

B

A

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

SESAME

KryptoKnight

KErberos

LDAP

Score 1 of 1

Question:

A LAN is

Response:

a Local Authentication Node

a Local Area Network

a Least Access Notification

a Linear Applebaum Network diagram

a Local Account Name

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Presentation

Application

Transport

Datalink

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

FRA or Type IV error

FAR or Type II error

CER or Type III error

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

Frame Relay

ATM

SONET

SMDS

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Owner

Organizational

Physical

Administrative

Technical