Give us your feedback!
Question:
In MAC the access policy is set by:
Response:
the system
the role
network ACL
the GPO
the owner
Which classification of fuel type is gasoline given?
B
D
C
A
Which access control includes locked doors?
Administrative
Organizational
Physical
Technical
Owner
How many levels are there in the latest (June 2013) OSI model?
10
5
8
7
6
Which of the following is immediately above the Data Link Layer in the OSI model:
Transport
Datalink
Network
Presentation
Session
Which of the following is the lowest in the OSI model:
Application
Data Link
Which classification of fuel type is paper given?
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following is NOT a RAW authentication protocol?
CHAP
PAP
EAP
LDAP
Determining whether a subject can log into a system is an example of
Authorization
Accountability
Authentication
Which access control includes training?
Match the following cryptology tools and technologies
One-time pads
Manual
Still in use in some instances. Recall, one-time pads are the most secure approach
Enigma machine
Electro-mechanical
Electrical lights, mechanical crank/spinwheel
AES, RSA Algorithms
Electronic
I know, you wanted to think "digital" but technically, electronic works as well
Cipherdisks
Mechanical
Think ceasar's spin wheel here
Single photon emissions
Quantum cryptography
used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night
Which of the following is a remote authentication system?
TACACS
OpenVPN
KERBEROS
SESAME
Which access control includes job rotation?