Overall Questions (15 random)

You got 14 of 15 possible points.
Your score was: 93 %

Question Results

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

B

D

A

C

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Authentication

Accountability

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Organizational

Physical

Administrative

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Visual

Technical

Physical

Administrative

Organizational

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Owner

Techincal

Technical

Organizational

Physical

Administrative

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

User acceptance

Initial Registration

Cost to implement

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Recovery

Detective

Compensating

Corrective

Preventative

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Presentation

Network

Datalink

Transport

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Working Authentication Name

a Wide Array Node

one of the Wilson-Adder Need types

a Wide Area Network

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Rijndael's Challenge

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Both Technical and Administrative

Administrative Controls

Technical controls

Physical Controls

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Retinal imagery

Voice

Ear shape/pattern

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Technical

Organizational

Authentication

Administrative

Physical

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

bus

star

ring

2 layer star

mesh