Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Presentation

Network

Datalink

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Administrative

Physical

Organizational

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Badge Scanning

Iris Scanning

Hand scanning

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Rijndael's Challenge

Moore's Law

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

MAC the Knife

Packet sniffing

LophtCrack

John the Ripper

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KErberos

LDAP

SESAME

KryptoKnight

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Manager set control

Access List Control

Mandatory access control

Role-based access control

Discretionary access control

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Session

Network

Physical

Transport

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Ear shape/pattern

Retinal imagery

Voice

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

30-50%

40-60%

20-40%

60-80%

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Datalink

Application

Transport

Network