Give us your feedback!
Question:
Match the following key terms
Response:
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Clark-Wilson focuses primarily on:
Address Integrity
Confidentialty
Authentication
Accessibility
Which access control includes asset classification?
Physical
Administrative
Organizational
Technical
Owner
Which OSI layer includes the LLC and MAC sub-layers?
Transport
Network
Data Link
Session
Which of the following is the lowest in the OSI model:
Which of the following is the highest in the OSI model:
Presentation
Which of the following packet switched networks is best suited to support fully meshed VPNs?
MPLS
Frame Relay
ATM
SMDS
SONET
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Technical controls
Both technical and administrative controls
Physical controls
Administrative controls
Which of the following is NOT an example of SSO?
LDAP
KryptoKnight
SESAME
KErberos
Which access control requires sensitivity labels on all subjects and objects?
Manager set control
Mandatory access control
Discretionary access control
Access List Control
Role-based access control
Which of the following is primarily focused on reducing risk?
Recovery
Detective
Corrective
Preventative
Deterrent
Which classification of fuel type is a computer given?
D
B
A
C
Which classification of fuel type is paper given?
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Both Technical and Administrative controls
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Exposure
$1M dollars per day downtime
Risk
A proxy server
Countermeasure