Give us your feedback!
Question:
Match the following terms and definitions
Response:
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Corrective
Intended to bring the environment back to production levels
Recovery
Identify an incidents activities
Detective
Alternate measures of control
Compensating
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
Exposure
A proxy server
Countermeasure
Which access control requires sensitivity labels on all subjects and objects?
Mandatory access control
Role-based access control
Discretionary access control
Manager set control
Access List Control
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Physical Controls
Technical controls
Administrative Controls
Both Technical and Administrative
Which of the following is primarily focused on identifying alternate solutions to achieve a task?
Preventative
Clark-Wilson focuses primarily on:
Confidentialty
Address Integrity
Authentication
Availability
Accessibility
Owner-set permissions are an example of:
Clark-Wilson
mandatory access control
role-based access control
Which of the following is the highest in the OSI model:
Network
Transport
Physical
Data Link
Presentation
Which classification of fuel type is paper given?
D
B
A
C
Which classification of fuel type is grease given?
Which of the following packet switched networks is best suited to support fully meshed VPNs?
Frame Relay
SMDS
SONET
ATM
MPLS
Which access control includes job rotation?
Administrative
Organizational
Technical
Which classification of fuel type is gasoline given?
Which access control includes asset classification?
Owner
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Lighting, Fencing, guard patrols