Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Technical

Physical

Organizational

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

LophtCrack

John the Ripper

Packet sniffing

brute force/dictionary attack

MAC the Knife

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Corrective

Recovery

Deterrent

Detective

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

SONET

SMDS

Frame Relay

MPLS

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Mandatory access control

Need-to-Know control

Owner set access control

Access List Control

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Voice

Hand shape/pattern

Retinal imagery

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Wide Array Node

a Working Authentication Name

a Wide Area Network

one of the Wilson-Adder Need types

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Owner

Technical

Administrative

Organizational

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Datalink

Presentation

Session

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Authentication

Data Integrity

Confidentialty

Accessibility

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Administrative

Physical

Owner

Technical

Organizational

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

mandatory access control

role-based access control

Clark-Wilson

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

CHAP

EAP

PAP

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Access List Control

Mandatory access control

Role-based access control

Discretionary access control

Manager set control

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Iris Scanning

Badge Scanning

Hand scanning