Give us your feedback!
Question:
Which access control includes job rotation?
Response:
Administrative
Physical
Organizational
Technical
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Moore's Law
Diffe-Hillman's Axiom
Rijndael's Challenge
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
John's computer access changed with his reassignment to a new department. This is an example of:
Mandatory access control
Role-based access control
Owner set access control
Need-to-Know control
Access List Control
Match the following terms and definitions
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Corrective
Intended to bring the environment back to production levels
Recovery
Identify an incidents activities
Detective
Alternate measures of control
Compensating
Which access control includes locked doors?
Owner
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Both technical and administrative controls
Technical controls
Administrative controls
Physical controls
Which of the following have the best CER?
Hand scanning
Iris Scanning
Badge Scanning
Finger scanning
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Physical Controls
Administrative Controls
Both Technical and Administrative
Which of the following is the highest in the OSI model:
Data Link
Presentation
Transport
Network
Biometric authentication is most often hampered by:
Rings/Weight change
Initial Registration
User acceptance
Cost to implement
Which of the following is immediately above the Transport Layer in the OSI model:
Session
Datalink
A WAN is
one of the Wilson-Adder Need types
a Wide Area Network
the Westinghouse Address Naming convention
a Working Authentication Name
a Wide Array Node
Which classification of fuel type is a computer given?
B
C
A
D
Which of the following packet switched networks is best suited to support fully meshed VPNs?
SMDS
MPLS
Frame Relay
SONET
ATM
Which access control includes intrusion detection?
Techincal