Overall Questions (15 random)

You got 16 of 19 possible points.
Your score was: 84 %

Question Results

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Authentication

Physical

Organizational

Technical

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Network

Presentation

Session

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Preventative

Recovery

Compensating

Corrective

Detective

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Recovery

Deterrent

Detective

Corrective

Preventative

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Network

Presentation

Transport

Datalink

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Manager set control

Access List Control

Role-based access control

Mandatory access control

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

5

10

6

7

8

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the GPO

the system

network ACL

the owner

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Accessibility

Confidentialty

Authentication

Address Integrity

Availability

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Administrative

Technical

Organizational

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Confidentialty

Accessibility

Availability

Authentication

Data Integrity

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

D

C

B

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Visual

Physical

Organizational

Technical