Give us your feedback!
Question:
More key terms from Chapter 2
Response:
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Exposure
Which classification of fuel type is wood given?
C
A
D
B
Which access control includes audit trails?
Organizational
Technical
Owner
Administrative
Physical
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Physical controls
Administrative controls
Both Technical and Administrative controls
Technical controls
Which of the following is primarily focused on identifying violations and incidents?
Corrective
Compensating
Recovery
Preventative
Detective
Which of the following packet switched networks is best suited to support fully meshed VPNs?
MPLS
ATM
SONET
Frame Relay
SMDS
Which of the following is the highest in the OSI model:
Network
Presentation
Transport
Data Link
Which access control includes motion detectors?
Authentication
Which classification of fuel type is paper given?
Which access control includes training?
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following extinguishing methods is best for a computer or electrical fire?
Soda Acid
ESD Blanket
CO2
Water
Owner-set permissions are an example of:
Discretionary access control
Clark-Wilson
role-based access control
mandatory access control
A WAN is
a Wide Area Network
one of the Wilson-Adder Need types
the Westinghouse Address Naming convention
a Working Authentication Name
a Wide Array Node
Work factor is defined as:
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an attacker to overcome a protective measure
the amount of effort/time required to maintain an established security plan once it has been implemented
the amount of effort/time required by an administrator to establish a reasonable system security plan