Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Both technical and administrative controls

Administrative controls

Technical controls

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KErberos

SESAME

LDAP

KryptoKnight

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Deterrent

Recovery

Corrective

Detective

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

C

B

A

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

A

B

C

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Authentication

Accountability

Score 0 of 1

Question:

Which access control includes locked doors?

Response:

Administrative

Organizational

Technical

Owner

Physical

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

2 layer star

ring

bus

star

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Organizational

Administrative

Physical

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Operating System Controls/Policies

System Access Controls

Data Access Controls

Access Control Lists

Firewalls/IPS

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Technical

Administrative

Physical