Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Organizational

Technical

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Diffe-Hillman's Axiom

Rijndael's Challenge

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Score 0 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Role-based access control

Owner set access control

Need-to-Know control

Access List Control

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Technical

Physical

Owner

Administrative

Organizational

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Technical controls

Administrative controls

Physical controls

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Iris Scanning

Badge Scanning

Finger scanning

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Administrative Controls

Technical controls

Both Technical and Administrative

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Data Link

Presentation

Transport

Network

Physical

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

Initial Registration

User acceptance

Cost to implement

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Network

Datalink

Presentation

Score 1 of 1

Question:

A WAN is

Response:

one of the Wilson-Adder Need types

a Wide Area Network

the Westinghouse Address Naming convention

a Working Authentication Name

a Wide Array Node

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

C

A

D

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

MPLS

Frame Relay

SONET

ATM

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Technical

Owner

Physical

Administrative

Techincal

Organizational