Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

10

8

6

5

7

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FAR or Type II error

FRA or Type IV error

CER or Type III error

FRR or Type I error

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

C

D

B

A

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SMDS

ATM

SONET

Frame Relay

MPLS

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

a Wide Area Network

a Wide Array Node

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Visual

Technical

Organizational

Physical

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Technical

Organizational

Administrative

Owner

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Compensating

Corrective

Detective

Recovery

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Network

Physical

Presentation

Transport

Data Link

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

SESAME

KERBEROS

OpenVPN

TACACS

Score 1 of 1

Question:

A LAN is

Response:

a Least Access Notification

a Local Area Network

a Local Authentication Node

a Linear Applebaum Network diagram

a Local Account Name

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Rijndael's Challenge

Moore's Law

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

Initial Registration

User acceptance

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Physical

Authentication

Technical

Organizational