Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Mandatory access control

Access List Control

Role-based access control

Manager set control

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Presentation

Datalink

Network

Session

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Address Integrity

Confidentialty

Availability

Accessibility

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

Soda Acid

Water

ESD Blanket

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Which access control includes training?

Response:

Administrative

Physical

Technical

Organizational

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Rijndael's Challenge

Moore's Law

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Both Technical and Administrative controls

Physical controls

Technical controls

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

brute force/dictionary attack

MAC the Knife

John the Ripper

LophtCrack

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

Discretionary access control

Clark-Wilson

role-based access control

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Technical controls

Administrative controls

Physical controls

Both technical and administrative controls

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SONET

ATM

SMDS

Frame Relay

MPLS

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

PAP

CHAP

EAP