Give us your feedback!
Question:
Match the following key terms
Response:
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which classification of fuel type is gasoline given?
B
A
C
D
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Administrative Controls
Technical controls
Both Technical and Administrative
Physical Controls
Which of the following have the best CER?
Hand scanning
Iris Scanning
Finger scanning
Badge Scanning
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Lighting, Fencing, guard patrols
Match the following terms and definitions
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Corrective
Intended to bring the environment back to production levels
Recovery
Identify an incidents activities
Detective
Alternate measures of control
Compensating
Falsely rejecting an authorized user is:
FRR or Type I error
FAR or Type II error
CER or Type III error
FRA or Type IV error
Which of the following is NOT an example of SSO?
LDAP
SESAME
KErberos
KryptoKnight
Which of the following packet switched networks is best suited to support fully meshed VPNs?
SONET
ATM
SMDS
Frame Relay
MPLS
Determining whether a subject can log into a system is an example of
Accountability
Authentication
Authorization
Which access control includes cameras?
Physical
Organizational
Visual
Administrative
Technical
Work factor is defined as:
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required to maintain an established security plan once it has been implemented
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an attacker to overcome a protective measure
Which of the following are the three components of the fire triangle?
Fire/Fuel/Oxygen
Heat/Fuel/Oxygen
Fire/Combustion/Oxygen
Heat/Combustion/Oxygen
Bell-La Padula focuses primarily on:
Accessibility
Data Integrity
Confidentialty
John's computer access changed with his reassignment to a new department. This is an example of:
Owner set access control
Access List Control
Need-to-Know control
Mandatory access control
Role-based access control