Give us your feedback!
Question:
What OSI Layer includes data compression?
Response:
Presentation
Datalink
Network
Transport
Application
Which of the following would be the least useful in attempting to crack a password?
MAC the Knife
John the Ripper
brute force/dictionary attack
Packet sniffing
LophtCrack
Falsely rejecting an authorized user is:
FRA or Type IV error
FAR or Type II error
CER or Type III error
FRR or Type I error
Which access control includes cameras?
Physical
Visual
Technical
Organizational
Administrative
Which of the following is NOT an example of SSO?
KErberos
KryptoKnight
SESAME
LDAP
Which of the following are the three components of the fire triangle?
Heat/Combustion/Oxygen
Heat/Fuel/Oxygen
Fire/Combustion/Oxygen
Fire/Fuel/Oxygen
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Administrative controls
Both technical and administrative controls
Physical controls
Technical controls
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following extinguishing methods is best for a computer or electrical fire?
CO2
ESD Blanket
Soda Acid
Water
Which of the following packet switched networks is best suited to support fully meshed VPNs?
SMDS
MPLS
Frame Relay
ATM
SONET
Work factor is defined as:
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required to maintain an established security plan once it has been implemented
the amount of effort/time required by an attacker to overcome a protective measure
the amount of effort/time required by an administrator to establish a reasonable system security plan
How many levels are there in the latest (June 2013) OSI model?
7
6
5
8
10
Which access control includes motion detectors?
Authentication
Match the following terms and definitions
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Recovery
Intended to bring the environment back to production levels
Corrective
Identify an incidents activities
Detective
Alternate measures of control
Compensating
Owner-set permissions are an example of:
role-based access control
Discretionary access control
mandatory access control
Clark-Wilson