Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Both Technical and Administrative

Administrative Controls

Technical controls

Physical Controls

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Technical

Organizational

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Organizational

Administrative

Technical

Owner

Physical

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

OpenVPN

SESAME

KERBEROS

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

C

B

D

A

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Exposure

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Authentication

Accessibility

Availability

Data Integrity

Confidentialty

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Network

Transport

Datalink

Presentation

Application

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

D

A

C

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SONET

ATM

MPLS

SMDS

Frame Relay

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

CHAP

PAP

LDAP

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Visual

Administrative

Physical

Technical

Organizational