Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

A LAN is

Response:

a Local Account Name

a Least Access Notification

a Local Area Network

a Linear Applebaum Network diagram

a Local Authentication Node

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Operating System Controls/Policies

Data Access Controls

Access Control Lists

System Access Controls

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Badge Scanning

Iris Scanning

Hand scanning

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Recovery

Compensating

Preventative

Corrective

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Data Link

Network

Application

Session

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Technical

Administrative

Physical

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Network

Session

Transport

Datalink

Presentation

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Network

Application

Datalink

Presentation

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the owner

the GPO

the system

the role

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Detective

Recovery

Compensating

Corrective

Preventative

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

Frame Relay

SMDS

SONET

ATM

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Physical

Technical

Administrative

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

TACACS

SESAME

OpenVPN