Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Technical controls

Administrative controls

Both technical and administrative controls

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Session

Transport

Network

Data Link

Physical

Score 1 of 1

Question:

A LAN is

Response:

a Linear Applebaum Network diagram

a Local Authentication Node

a Local Account Name

a Least Access Notification

a Local Area Network

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Both Technical and Administrative

Technical controls

Administrative Controls

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KErberos

SESAME

KryptoKnight

LDAP

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Cost to implement

Rings/Weight change

User acceptance

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SMDS

MPLS

Frame Relay

ATM

SONET

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Accessibility

Availability

Confidentialty

Data Integrity

Authentication

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

OpenVPN

TACACS

SESAME

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

star

ring

2 layer star

bus

mesh

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

B

A

C

D

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Administrative

Organizational

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Network

Datalink

Presentation

Session

Transport