Overall Questions (15 random)

You got 17 of 19 possible points.
Your score was: 89 %

Question Results

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

B

D

C

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

C

D

B

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

CHAP

PAP

EAP

LDAP

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required to maintain an established security plan once it has been implemented

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Role-based access control

Mandatory access control

Need-to-Know control

Access List Control

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Organizational

Techincal

Technical

Owner

Physical

Administrative

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Organizational

Administrative

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Network

Presentation

Datalink

Transport

Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Administrative controls

Technical controls

Physical controls

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

20-40%

30-50%

40-60%

60-80%

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

SONET

SMDS

MPLS

ATM

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Owner

Physical

Organizational

Administrative

Technical

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

Soda Acid

ESD Blanket

CO2