Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Availability

Address Integrity

Confidentialty

Authentication

Accessibility

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Administrative

Organizational

Technical

Owner

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Transport

Network

Data Link

Session

Physical

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Data Link

Session

Transport

Physical

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Network

Transport

Data Link

Presentation

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

Frame Relay

ATM

SMDS

SONET

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Technical controls

Both technical and administrative controls

Physical controls

Administrative controls

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KryptoKnight

SESAME

KErberos

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Manager set control

Mandatory access control

Discretionary access control

Access List Control

Role-based access control

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Recovery

Detective

Corrective

Preventative

Deterrent

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

B

A

C

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

B

D

C

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Administrative controls

Technical controls

Both Technical and Administrative controls

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Exposure

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct