Give us your feedback!
Question:
Which of the following is a remote authentication system?
Response:
SESAME
OpenVPN
TACACS
KERBEROS
Which access control includes intrusion detection?
Techincal
Technical
Organizational
Physical
Owner
Administrative
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
SMDS
Frame Relay
MPLS
SONET
ATM
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Technical controls
Administrative controls
Physical controls
Both technical and administrative controls
A LAN is
a Local Account Name
a Local Area Network
a Local Authentication Node
a Least Access Notification
a Linear Applebaum Network diagram
Which of the following is the lowest in the OSI model:
Network
Transport
Session
Data Link
Which of the following extinguishing methods is best for a computer or electrical fire?
Water
CO2
ESD Blanket
Soda Acid
Determining whether a subject can log into a system is an example of
Accountability
Authentication
Authorization
Which classification of fuel type is wood given?
A
D
B
C
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Both Technical and Administrative controls
Which access control includes job rotation?
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Moore's Law
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
Rijndael's Challenge
Diffe-Hillman's Axiom
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Exposure
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following is not a typical layer 1 topology?
2 layer star
mesh
star
ring
bus