Give us your feedback!
Question:
Which access control includes audit trails?
Response:
Owner
Administrative
Organizational
Technical
Physical
John's computer access changed with his reassignment to a new department. This is an example of:
Role-based access control
Mandatory access control
Need-to-Know control
Access List Control
Owner set access control
Which access control includes motion detectors?
Authentication
Which of the following is the lowest in the OSI model:
Transport
Application
Network
Session
Data Link
Work factor is defined as:
the amount of effort/time required to maintain an established security plan once it has been implemented
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required by an attacker to overcome a protective measure
Which classification of fuel type is a computer given?
A
B
C
D
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Physical controls
Administrative controls
Both Technical and Administrative controls
Technical controls
Which access control requires sensitivity labels on all subjects and objects?
Manager set control
Discretionary access control
Bell-La Padula focuses primarily on:
Availability
Accessibility
Confidentialty
Data Integrity
How many levels are there in the latest (June 2013) OSI model?
5
6
8
7
10
Which of the following would be the least useful in attempting to crack a password?
LophtCrack
MAC the Knife
John the Ripper
Packet sniffing
brute force/dictionary attack
Which of the following is primarily focused on restoring systems and information?
Corrective
Detective
Recovery
Preventative
Compensating
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
Frame Relay
ATM
SMDS
SONET
MPLS
Match the following key terms
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following is primarily focused on identifying alternate solutions to achieve a task?