Give us your feedback!
Question:
A WAN is
Response:
a Working Authentication Name
a Wide Array Node
a Wide Area Network
the Westinghouse Address Naming convention
one of the Wilson-Adder Need types
Which classification of fuel type is wood given?
C
D
A
B
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Administrative Controls
Physical Controls
Technical controls
Both Technical and Administrative
Which access control protects the entire system?
Firewalls/IPS
Access Control Lists
Operating System Controls/Policies
System Access Controls
Data Access Controls
Falsely rejecting an authorized user is:
FAR or Type II error
FRA or Type IV error
FRR or Type I error
CER or Type III error
John's computer access changed with his reassignment to a new department. This is an example of:
Need-to-Know control
Role-based access control
Owner set access control
Mandatory access control
Access List Control
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Lighting, Fencing, guard patrols
Which OSI layer includes the LLC and MAC sub-layers?
Session
Physical
Data Link
Transport
Network
Which access control includes cameras?
Organizational
Visual
Administrative
Technical
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
Exposure
A proxy server
Countermeasure
What is the ideal humidity level for a data center?
20-40%
40-60%
30-50%
60-80%
Which of the following is the lowest in the OSI model:
Application
Which access control includes audit trails?
Owner
Which access control includes motion detectors?
Authentication
Which of the following is primarily focused on reducing risk?
Deterrent
Detective
Recovery
Preventative
Corrective