Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Rijndael's Challenge

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Diffe-Hillman's Axiom

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

8

10

5

6

7

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Datalink

Network

Presentation

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Detective

Corrective

Deterrent

Recovery

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Accessibility

Authentication

Data Integrity

Confidentialty

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

PAP

LDAP

CHAP

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Authentication

Technical

Physical

Administrative

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Technical controls

Administrative controls

Physical controls

Both technical and administrative controls

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Administrative

Organizational

Physical

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Initial Registration

Rings/Weight change

User acceptance

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Discretionary access control

Clark-Wilson

mandatory access control

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Wide Area Network

a Wide Array Node

one of the Wilson-Adder Need types

a Working Authentication Name

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

B

A

C

D

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

B

D

A