Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

SESAME

OpenVPN

TACACS

KERBEROS

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Techincal

Technical

Organizational

Physical

Owner

Administrative

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SMDS

Frame Relay

MPLS

SONET

ATM

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Technical controls

Administrative controls

Physical controls

Both technical and administrative controls

Score 1 of 1

Question:

A LAN is

Response:

a Local Account Name

a Local Area Network

a Local Authentication Node

a Least Access Notification

a Linear Applebaum Network diagram

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Transport

Session

Data Link

Physical

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

CO2

ESD Blanket

Soda Acid

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

D

B

C

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Technical controls

Administrative controls

Both Technical and Administrative controls

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Diffe-Hillman's Axiom

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

mesh

star

ring

bus