Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

C

B

A

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Administrative

Technical

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Presentation

Datalink

Session

Network

Transport

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Organizational

Owner

Administrative

Physical

Technical

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

A

B

D

C

Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Badge Scanning

Iris Scanning

Hand scanning

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Accessibility

Data Integrity

Confidentialty

Authentication

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRA or Type IV error

CER or Type III error

FAR or Type II error

FRR or Type I error

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Rijndael's Challenge

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Mandatory access control

Access List Control

Manager set control

Discretionary access control

Role-based access control

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

role-based access control

mandatory access control

Discretionary access control

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Address Integrity

Confidentialty

Availability

Authentication

Accessibility

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Both Technical and Administrative

Technical controls

Administrative Controls

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Ear shape/pattern

Retinal imagery

Hand shape/pattern