Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

A WAN is

Response:

a Wide Array Node

the Westinghouse Address Naming convention

a Wide Area Network

a Working Authentication Name

one of the Wilson-Adder Need types

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Organizational

Technical

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

Frame Relay

SMDS

MPLS

SONET

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Administrative controls

Technical controls

Physical controls

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Organizational

Technical

Physical

Administrative

Owner

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Application

Transport

Network

Data Link

Session

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Physical

Organizational

Administrative

Owner

Techincal

Technical

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FAR or Type II error

FRR or Type I error

FRA or Type IV error

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Physical

Technical

Authentication

Administrative

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

ring

star

bus

mesh

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

B

A

C

D

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Technical

Organizational

Owner

Physical

Administrative

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Moore's Law

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct