Give us your feedback!
Question:
Which of the following packet switched networks is best suited to support fully meshed VPNs?
Response:
SONET
ATM
Frame Relay
SMDS
MPLS
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Technical controls
Lighting, Fencing, guard patrols
Physical Controls
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Diffe-Hillman's Axiom
Rijndael's Challenge
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
Moore's Law
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following have the best CER?
Finger scanning
Badge Scanning
Iris Scanning
Hand scanning
How many levels are there in the latest (June 2013) OSI model?
8
10
7
5
6
Which of the following is immediately above the Data Link Layer in the OSI model:
Datalink
Session
Transport
Presentation
Network
Which of the following is NOT an example of biometric identification?
Retinal imagery
Ear shape/pattern
Voice
Hand shape/pattern
Which access control includes locked doors?
Physical
Technical
Organizational
Owner
Administrative
John's computer access changed with his reassignment to a new department. This is an example of:
Role-based access control
Access List Control
Need-to-Know control
Mandatory access control
Owner set access control
Which of the following are the three components of the fire triangle?
Heat/Fuel/Oxygen
Fire/Fuel/Oxygen
Heat/Combustion/Oxygen
Fire/Combustion/Oxygen
Match the following terms and definitions
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Corrective
Intended to bring the environment back to production levels
Recovery
Identify an incidents activities
Detective
Alternate measures of control
Compensating
Which access control includes training?
Which of the following is primarily focused on reducing risk?
Preventative
Which of the following would be the least useful in attempting to crack a password?
John the Ripper
Packet sniffing
brute force/dictionary attack
MAC the Knife
LophtCrack