Give us your feedback!
Question:
Biometric authentication is most often hampered by:
Response:
Initial Registration
Cost to implement
User acceptance
Rings/Weight change
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
A proxy server
Countermeasure
Match the following cryptology tools and technologies
One-time pads
Manual
Still in use in some instances. Recall, one-time pads are the most secure approach
Enigma machine
Electro-mechanical
Electrical lights, mechanical crank/spinwheel
AES, RSA Algorithms
Electronic
I know, you wanted to think "digital" but technically, electronic works as well
Cipherdisks
Think ceasar's spin wheel here
Single photon emissions
Quantum cryptography
used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
Diffe-Hillman's Axiom
Moore's Law
Rijndael's Challenge
Which classification of fuel type is paper given?
D
C
B
A
Which access control requires sensitivity labels on all subjects and objects?
Discretionary access control
Mandatory access control
Role-based access control
Manager set control
Access List Control
Determining whether a subject can log into a system is an example of
Accountability
Authentication
Authorization
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Physical controls
Both Technical and Administrative controls
Administrative controls
Technical controls
Which of the following is primarily focused on identifying alternate solutions to achieve a task?
Compensating
Corrective
Recovery
Detective
Preventative
Which classification of fuel type is wood given?
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which access control includes asset classification?
Physical
Administrative
Owner
Organizational
Technical
Which OSI layer includes the LLC and MAC sub-layers?
Transport
Network
Session
Data Link
Which of the following is NOT an example of biometric identification?
Voice
Ear shape/pattern
Hand shape/pattern
Retinal imagery
Which of the following is primarily focused on reducing risk?
Deterrent