Give us your feedback!
Question:
What OSI Layer includes data encryption?
Response:
Transport
Application
Datalink
Presentation
Network
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following is a remote authentication system?
TACACS
KERBEROS
SESAME
OpenVPN
Which classification of fuel type are electrical fires given?
D
C
B
A
Work factor is defined as:
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required to maintain an established security plan once it has been implemented
the amount of effort/time required by an attacker to overcome a protective measure
Match the following cryptology tools and technologies
One-time pads
Manual
Still in use in some instances. Recall, one-time pads are the most secure approach
Enigma machine
Electro-mechanical
Electrical lights, mechanical crank/spinwheel
AES, RSA Algorithms
Electronic
I know, you wanted to think "digital" but technically, electronic works as well
Cipherdisks
Mechanical
Think ceasar's spin wheel here
Single photon emissions
Quantum cryptography
used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night
What OSI Layer includes data compression?
Which access control includes training?
Physical
Organizational
Technical
Administrative
A LAN is
a Local Account Name
a Linear Applebaum Network diagram
a Least Access Notification
a Local Authentication Node
a Local Area Network
John's computer access changed with his reassignment to a new department. This is an example of:
Mandatory access control
Need-to-Know control
Role-based access control
Owner set access control
Access List Control
Which of the following is primarily focused on restoring systems and information?
Preventative
Recovery
Compensating
Corrective
Detective
Which access control includes motion detectors?
Authentication
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Exposure
Presence of a vulnerability which exposes the organization
Risk
What is the ideal humidity level for a data center?
20-40%
40-60%
60-80%
30-50%
Biometric authentication is most often hampered by:
Cost to implement
Rings/Weight change
Initial Registration
User acceptance