Give us your feedback!
Question:
Which of the following would be the least useful in attempting to crack a password?
Response:
Packet sniffing
brute force/dictionary attack
MAC the Knife
LophtCrack
John the Ripper
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Technical controls
Administrative controls
Both Technical and Administrative controls
Physical controls
Match the following control types to their purposes
Reducing Risk
Preventative
Correcting violations and incidents
Detective
Corrective controls also help improve existing preventative and detective controls
Discouraging violations
Deterrent
Providing alternate ways of accomplishing a task
Compensating
Restoring systems and information
Recovery
Work factor is defined as:
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required to maintain an established security plan once it has been implemented
the amount of effort/time required by an attacker to overcome a protective measure
Match the following terms to definitions
Training, configuration management of documentation, risk management
Firewalls, IDS, encryption
Lighting, Fencing, guard patrols
Physical Controls
Which classification of fuel type is gasoline given?
A
D
B
C
Which access control includes training?
Organizational
Technical
Physical
Administrative
Which of the following have the best CER?
Iris Scanning
Hand scanning
Finger scanning
Badge Scanning
Owner-set permissions are an example of:
mandatory access control
Discretionary access control
Clark-Wilson
role-based access control
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Moore's Law
Rijndael's Challenge
Kerckhoff's Principle
Diffe-Hillman's Axiom
Which of the following is primarily focused on identifying violations and incidents?
Corrective
Which of the following is immediately above the Transport Layer in the OSI model:
Datalink
Presentation
Session
Network
Which of the following is NOT a RAW authentication protocol?
EAP
PAP
LDAP
CHAP
Which classification of fuel type are electrical fires given?
Which access control includes locked doors?
Owner