Give us your feedback!
Question:
What OSI Layer includes data compression?
Response:
Presentation
Transport
Network
Application
Datalink
Which of the following is not a typical layer 1 topology?
star
bus
ring
mesh
2 layer star
Which of the following is NOT an example of biometric identification?
Voice
Ear shape/pattern
Hand shape/pattern
Retinal imagery
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Technical controls
Lighting, Fencing, guard patrols
Physical Controls
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
Exposure
A proxy server
Countermeasure
Bell-La Padula focuses primarily on:
Confidentialty
Accessibility
Availability
Data Integrity
Authentication
Which of the following is the highest in the OSI model:
Physical
Data Link
Which access control includes intrusion detection?
Technical
Techincal
Organizational
Administrative
Owner
Which access control includes training?
Which access control includes job rotation?
Which of the following is immediately above the Data Link Layer in the OSI model:
Session
Falsely rejecting an authorized user is:
FRR or Type I error
FAR or Type II error
FRA or Type IV error
CER or Type III error
Which of the following is immediately above the Transport Layer in the OSI model:
John's computer access changed with his reassignment to a new department. This is an example of:
Access List Control
Need-to-Know control
Role-based access control
Mandatory access control
Owner set access control
Which of the following is NOT an example of SSO?
SESAME
KErberos
LDAP
KryptoKnight