Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Datalink

Network

Transport

Application

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

John the Ripper

brute force/dictionary attack

Packet sniffing

LophtCrack

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRA or Type IV error

FAR or Type II error

CER or Type III error

FRR or Type I error

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Physical

Visual

Technical

Organizational

Administrative

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KErberos

KryptoKnight

SESAME

LDAP

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Administrative controls

Both technical and administrative controls

Physical controls

Technical controls

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

ESD Blanket

Soda Acid

Water

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

MPLS

Frame Relay

ATM

SONET

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

7

6

5

8

10

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Physical

Administrative

Technical

Authentication

Score 0 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Discretionary access control

mandatory access control

Clark-Wilson