Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Detective

Corrective

Compensating

Recovery

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Data Integrity

Confidentialty

Availability

Authentication

Accessibility

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the GPO

the system

the owner

the role

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

a Wide Area Network

the Westinghouse Address Naming convention

a Wide Array Node

one of the Wilson-Adder Need types

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Organizational

Technical

Physical

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Preventative

Compensating

Detective

Corrective

Recovery

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

Water

Soda Acid

CO2

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

CER or Type III error

FRA or Type IV error

FAR or Type II error

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

MPLS

Frame Relay

SMDS

ATM

SONET

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Technical

Physical

Owner

Organizational

Administrative

Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Operating System Controls/Policies

Access Control Lists

Firewalls/IPS

System Access Controls

Data Access Controls

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

brute force/dictionary attack

John the Ripper

MAC the Knife

LophtCrack

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Network

Presentation

Session

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Compensating

Preventative

Corrective

Recovery