Give us your feedback!
Question:
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Response:
Physical controls
Both technical and administrative controls
Administrative controls
Technical controls
Which of the following is NOT an example of SSO?
KErberos
SESAME
LDAP
KryptoKnight
Which of the following are the three components of the fire triangle?
Fire/Combustion/Oxygen
Fire/Fuel/Oxygen
Heat/Fuel/Oxygen
Heat/Combustion/Oxygen
Which of the following is primarily focused on reducing risk?
Preventative
Deterrent
Recovery
Corrective
Detective
Match the following terms and definitions
Intended to discourage a potential attacker
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Intended to bring the environment back to production levels
Identify an incidents activities
Alternate measures of control
Compensating
Which classification of fuel type is paper given?
D
C
B
A
Which classification of fuel type is a computer given?
Determining whether a subject can log into a system is an example of
Authorization
Authentication
Accountability
Which access control includes locked doors?
Administrative
Organizational
Technical
Owner
Physical
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Exposure
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following is not a typical layer 1 topology?
mesh
2 layer star
ring
bus
star
Which access control includes job rotation?
Which access control protects the entire system?
Operating System Controls/Policies
System Access Controls
Data Access Controls
Access Control Lists
Firewalls/IPS
Which access control includes training?