Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Owner

Administrative

Organizational

Technical

Physical

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Mandatory access control

Need-to-Know control

Access List Control

Owner set access control

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Authentication

Technical

Administrative

Physical

Organizational

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Application

Network

Session

Data Link

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

B

C

D

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Administrative controls

Both Technical and Administrative controls

Technical controls

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Mandatory access control

Manager set control

Access List Control

Discretionary access control

Role-based access control

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Accessibility

Confidentialty

Data Integrity

Authentication

Score 0 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

5

6

8

7

10

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

LophtCrack

MAC the Knife

John the Ripper

Packet sniffing

brute force/dictionary attack

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Detective

Recovery

Preventative

Compensating

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

Frame Relay

ATM

SMDS

SONET

MPLS

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Compensating

Preventative

Recovery

Corrective