Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Transport

Application

Data Link

Network

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

D

B

A

C

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Physical

Administrative

Technical

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Availability

Address Integrity

Confidentialty

Accessibility

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Presentation

Network

Datalink

Application

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Physical

Technical

Owner

Organizational

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

LophtCrack

brute force/dictionary attack

MAC the Knife

John the Ripper

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Recovery

Preventative

Deterrent

Detective

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Physical Controls

Technical controls

Both Technical and Administrative

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Voice

Retinal imagery

Ear shape/pattern

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

SESAME

KryptoKnight

LDAP

KErberos

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

SONET

SMDS

Frame Relay

ATM

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Physical

Data Link

Network

Transport