Give us your feedback!
Question:
John's computer access changed with his reassignment to a new department. This is an example of:
Response:
Need-to-Know control
Access List Control
Mandatory access control
Role-based access control
Owner set access control
Which of the following is NOT an example of biometric identification?
Retinal imagery
Ear shape/pattern
Hand shape/pattern
Voice
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following is primarily focused on restoring systems and information?
Recovery
Detective
Compensating
Corrective
Preventative
Which of the following is primarily focused on identifying alternate solutions to achieve a task?
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Technical controls
Both technical and administrative controls
Administrative controls
Physical controls
Which of the following is NOT an example of SSO?
KErberos
KryptoKnight
SESAME
LDAP
Clark-Wilson focuses primarily on:
Confidentialty
Accessibility
Address Integrity
Authentication
Which of the following packet switched networks is best suited to support fully meshed VPNs?
ATM
MPLS
SMDS
SONET
Frame Relay
Which of the following packet switched networks uses HDLC?
Which of the following is not a typical layer 1 topology?
bus
ring
mesh
2 layer star
star
Which of the following is primarily focused on identifying violations and incidents?
Which access control includes training?
Technical
Organizational
Administrative
Physical
Which access control includes motion detectors?
Which classification of fuel type is wood given?
A
B
C
D