Give us your feedback!
Question:
Which of the following is the lowest in the OSI model:
Response:
Data Link
Network
Physical
Session
Transport
Which of the following is primarily focused on identifying alternate solutions to achieve a task?
Corrective
Recovery
Preventative
Detective
Compensating
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Physical controls
Technical controls
Both Technical and Administrative controls
Administrative controls
Which access control includes job rotation?
Administrative
Technical
Organizational
Work factor is defined as:
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an attacker to overcome a protective measure
the amount of effort/time required to maintain an established security plan once it has been implemented
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Both technical and administrative controls
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Exposure
Which access control includes intrusion detection?
Techincal
Owner
Which OSI layer includes the LLC and MAC sub-layers?
Which access control includes cameras?
Visual
Which of the following is a remote authentication system?
KERBEROS
TACACS
SESAME
OpenVPN
A WAN is
one of the Wilson-Adder Need types
a Wide Area Network
a Wide Array Node
a Working Authentication Name
the Westinghouse Address Naming convention
Biometric authentication is most often hampered by:
User acceptance
Cost to implement
Rings/Weight change
Initial Registration
A LAN is
a Local Authentication Node
a Least Access Notification
a Local Account Name
a Local Area Network
a Linear Applebaum Network diagram
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Administrative Controls
Both Technical and Administrative
Physical Controls