Give us your feedback!
Question:
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Response:
Moore's Law
Rijndael's Challenge
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
Diffe-Hillman's Axiom
How many levels are there in the latest (June 2013) OSI model?
8
10
5
6
7
Which of the following is immediately above the Transport Layer in the OSI model:
Session
Datalink
Network
Presentation
Which of the following is primarily focused on reducing risk?
Preventative
Detective
Corrective
Deterrent
Recovery
Bell-La Padula focuses primarily on:
Availability
Accessibility
Authentication
Data Integrity
Confidentialty
Which of the following is NOT a RAW authentication protocol?
EAP
PAP
LDAP
CHAP
Which access control includes motion detectors?
Organizational
Technical
Physical
Administrative
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Technical controls
Administrative controls
Physical controls
Both technical and administrative controls
Which access control includes job rotation?
Biometric authentication is most often hampered by:
Cost to implement
Initial Registration
Rings/Weight change
User acceptance
Match the following terms to definitions
Training, configuration management of documentation, risk management
Firewalls, IDS, encryption
Lighting, Fencing, guard patrols
Physical Controls
Owner-set permissions are an example of:
role-based access control
Discretionary access control
Clark-Wilson
mandatory access control
A WAN is
the Westinghouse Address Naming convention
a Wide Area Network
a Wide Array Node
one of the Wilson-Adder Need types
a Working Authentication Name
Which classification of fuel type is grease given?
B
A
C
D
Which classification of fuel type is wood given?