Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

A

D

B

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Organizational

Technical

Owner

Administrative

Physical

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Administrative controls

Both Technical and Administrative controls

Technical controls

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Corrective

Compensating

Recovery

Preventative

Detective

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

ATM

SONET

Frame Relay

SMDS

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Network

Presentation

Transport

Data Link

Physical

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Authentication

Administrative

Technical

Physical

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

C

B

D

A

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Technical

Administrative

Organizational

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Soda Acid

ESD Blanket

CO2

Water

Score 0 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

Clark-Wilson

role-based access control

mandatory access control

Score 1 of 1

Question:

A WAN is

Response:

a Wide Area Network

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

a Working Authentication Name

a Wide Array Node

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan