Overall Questions (15 random)

You got 14 of 15 possible points.
Your score was: 93 %

Question Results

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Access List Control

Role-based access control

Discretionary access control

Manager set control

Mandatory access control

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Both Technical and Administrative

Technical controls

Administrative Controls

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Presentation

Datalink

Network

Application

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

C

D

B

A

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KryptoKnight

KErberos

SESAME

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

star

2 layer star

ring

bus

mesh

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

A

D

C

Score 1 of 1

Question:

A WAN is

Response:

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

a Wide Array Node

a Wide Area Network

a Working Authentication Name

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Compensating

Corrective

Recovery

Detective

Preventative

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Data Link

Presentation

Transport

Physical

Network

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Technical

Administrative

Physical

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Recovery

Detective

Preventative

Compensating

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Finger scanning

Badge Scanning

Iris Scanning