Give us your feedback!
Question:
Which of the following would be the least useful in attempting to crack a password?
Response:
MAC the Knife
Packet sniffing
brute force/dictionary attack
John the Ripper
LophtCrack
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
MPLS
SMDS
Frame Relay
ATM
SONET
Which of the following is not a typical layer 1 topology?
mesh
bus
star
2 layer star
ring
Which classification of fuel type is wood given?
D
A
C
B
Which access control includes job rotation?
Organizational
Physical
Technical
Administrative
Which of the following is the lowest in the OSI model:
Network
Transport
Session
Data Link
Which of the following packet switched networks uses HDLC?
Which access control protects the entire system?
Data Access Controls
System Access Controls
Access Control Lists
Operating System Controls/Policies
Firewalls/IPS
Which of the following is primarily focused on reducing risk?
Preventative
Recovery
Detective
Deterrent
Corrective
Which classification of fuel type are electrical fires given?
Work factor is defined as:
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an attacker to overcome a protective measure
the amount of effort/time required to maintain an established security plan once it has been implemented
Which of the following packet switched networks is best suited to support fully meshed VPNs?
A LAN is
a Linear Applebaum Network diagram
a Local Account Name
a Least Access Notification
a Local Area Network
a Local Authentication Node
Falsely rejecting an authorized user is:
FRR or Type I error
FAR or Type II error
CER or Type III error
FRA or Type IV error
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)