Overall Questions (15 random)

You got 14 of 15 possible points.
Your score was: 93 %

Question Results

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Technical controls

Administrative Controls

Both Technical and Administrative

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Owner

Technical

Physical

Administrative

Organizational

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Network

Session

Data Link

Transport

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Moore's Law

Diffe-Hillman's Axiom

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Risk

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Vulnerability

incorrect
Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Organizational

Technical

Administrative

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

star

bus

mesh

ring

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Techincal

Technical

Physical

Administrative

Owner

Organizational

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

role-based access control

Clark-Wilson

Discretionary access control

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

A

B

D

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

User acceptance

Rings/Weight change

Initial Registration

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

A

B

D

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Network

Presentation

Datalink

Session

Transport