Give us your feedback!
Question:
Which of the following is primarily focused on reducing risk?
Response:
Deterrent
Detective
Preventative
Corrective
Recovery
Which of the following is NOT a RAW authentication protocol?
PAP
LDAP
EAP
CHAP
Falsely rejecting an authorized user is:
FRR or Type I error
CER or Type III error
FAR or Type II error
FRA or Type IV error
Which access control includes job rotation?
Physical
Administrative
Technical
Organizational
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Moore's Law
Diffe-Hillman's Axiom
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
Rijndael's Challenge
Which of the following is a remote authentication system?
TACACS
OpenVPN
SESAME
KERBEROS
Which of the following is primarily focused on identifying violations and incidents?
Compensating
Which of the following packet switched networks is best suited to support fully meshed VPNs?
MPLS
ATM
SMDS
Frame Relay
SONET
Which access control includes motion detectors?
Authentication
Which access control includes audit trails?
Owner
Bell-La Padula focuses primarily on:
Confidentialty
Accessibility
Data Integrity
Which of the following is primarily focused on restoring systems and information?
Clark-Wilson focuses primarily on:
Address Integrity
Which of the following is the lowest in the OSI model:
Transport
Network
Data Link
Session