Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Availability

Accessibility

Authentication

Address Integrity

Confidentialty

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Organizational

Administrative

Physical

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Working Authentication Name

one of the Wilson-Adder Need types

a Wide Area Network

a Wide Array Node

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the system

the role

the owner

network ACL

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Data Integrity

Accessibility

Confidentialty

Authentication

Availability

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Administrative controls

Both technical and administrative controls

Physical controls

Technical controls

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

Clark-Wilson

role-based access control

Discretionary access control

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

Frame Relay

ATM

SMDS

MPLS

SONET

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required to maintain an established security plan once it has been implemented

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Access List Control

Role-based access control

Discretionary access control

Manager set control

Mandatory access control

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Data Link

Network

Presentation

Physical

Transport

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Iris Scanning

Badge Scanning

Finger scanning

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Organizational

Physical

Technical

Administrative

Visual

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Rijndael's Challenge

Kerckhoff's Principle

Diffe-Hillman's Axiom