Give us your feedback!
Question:
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Response:
Moore's Law
Diffe-Hillman's Axiom
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
Rijndael's Challenge
Which of the following is the lowest in the OSI model:
Session
Transport
Application
Data Link
Network
Which of the following are the three components of the fire triangle?
Heat/Combustion/Oxygen
Heat/Fuel/Oxygen
Fire/Fuel/Oxygen
Fire/Combustion/Oxygen
Which classification of fuel type is wood given?
D
B
A
C
Which access control includes training?
Organizational
Physical
Administrative
Technical
Clark-Wilson focuses primarily on:
Authentication
Availability
Address Integrity
Confidentialty
Accessibility
What OSI Layer includes data encryption?
Presentation
Datalink
Which access control includes asset classification?
Owner
Which of the following would be the least useful in attempting to crack a password?
Packet sniffing
LophtCrack
brute force/dictionary attack
MAC the Knife
John the Ripper
Which of the following is primarily focused on reducing risk?
Corrective
Recovery
Preventative
Deterrent
Detective
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Administrative Controls
Physical Controls
Technical controls
Both Technical and Administrative
Which of the following is NOT an example of biometric identification?
Hand shape/pattern
Voice
Retinal imagery
Ear shape/pattern
Which of the following is NOT an example of SSO?
SESAME
KryptoKnight
LDAP
KErberos
Which of the following packet switched networks is best suited to support fully meshed VPNs?
MPLS
SONET
SMDS
Frame Relay
ATM