Overall Questions (15 random)

You got 16 of 19 possible points.
Your score was: 84 %

Question Results

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Cost to implement

User acceptance

Rings/Weight change

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 3 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

C

B

A

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Mandatory access control

Role-based access control

Manager set control

Access List Control

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Both Technical and Administrative controls

Administrative controls

Technical controls

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Corrective

Recovery

Detective

Preventative

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

C

D

B

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Administrative

Owner

Organizational

Technical

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Transport

Network

Session

Physical

Data Link

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Ear shape/pattern

Hand shape/pattern

Retinal imagery

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Deterrent

Preventative

Corrective

Recovery