Overall Questions (15 random)

You got 17 of 19 possible points.
Your score was: 89 %

Question Results

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Application

Datalink

Presentation

Network

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

KERBEROS

SESAME

OpenVPN

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

D

C

B

A

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Datalink

Application

Presentation

Network

Transport

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Organizational

Technical

Administrative

Score 1 of 1

Question:

A LAN is

Response:

a Local Account Name

a Linear Applebaum Network diagram

a Least Access Notification

a Local Authentication Node

a Local Area Network

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Need-to-Know control

Role-based access control

Owner set access control

Access List Control

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Recovery

Compensating

Corrective

Detective

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Technical

Administrative

Physical

Authentication

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Risk

incorrect
Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

20-40%

40-60%

60-80%

30-50%

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

Initial Registration

User acceptance