Give us your feedback!
Question:
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Response:
Both Technical and Administrative
Administrative Controls
Technical controls
Physical Controls
Which access control includes job rotation?
Administrative
Physical
Technical
Organizational
Which access control includes asset classification?
Owner
Which of the following is a remote authentication system?
TACACS
OpenVPN
SESAME
KERBEROS
Which classification of fuel type is paper given?
C
B
D
A
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Exposure
$1M dollars per day downtime
Risk
A proxy server
Countermeasure
Bell-La Padula focuses primarily on:
Authentication
Accessibility
Availability
Data Integrity
Confidentialty
What OSI Layer includes data compression?
Network
Transport
Datalink
Presentation
Application
Which of the following are the three components of the fire triangle?
Heat/Combustion/Oxygen
Heat/Fuel/Oxygen
Fire/Fuel/Oxygen
Fire/Combustion/Oxygen
Which classification of fuel type is wood given?
Work factor is defined as:
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required to maintain an established security plan once it has been implemented
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an attacker to overcome a protective measure
Match the following terms and definitions
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Corrective
Intended to bring the environment back to production levels
Recovery
Identify an incidents activities
Detective
Alternate measures of control
Compensating
Which of the following packet switched networks is best suited to support fully meshed VPNs?
SONET
ATM
MPLS
SMDS
Frame Relay
Which of the following is NOT a RAW authentication protocol?
EAP
CHAP
PAP
LDAP
Which access control includes cameras?
Visual