Give us your feedback!
Question:
How many levels are there in the latest (June 2013) OSI model?
Response:
10
8
6
5
7
Falsely rejecting an authorized user is:
FAR or Type II error
FRA or Type IV error
CER or Type III error
FRR or Type I error
Which classification of fuel type is a computer given?
C
D
B
A
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
SMDS
ATM
SONET
Frame Relay
MPLS
A WAN is
a Working Authentication Name
one of the Wilson-Adder Need types
the Westinghouse Address Naming convention
a Wide Area Network
a Wide Array Node
Which access control includes cameras?
Administrative
Visual
Technical
Organizational
Physical
Which access control includes asset classification?
Owner
Which of the following is primarily focused on restoring systems and information?
Preventative
Compensating
Corrective
Detective
Recovery
Which of the following is the highest in the OSI model:
Network
Presentation
Transport
Data Link
Which of the following is a remote authentication system?
SESAME
KERBEROS
OpenVPN
TACACS
A LAN is
a Least Access Notification
a Local Area Network
a Local Authentication Node
a Linear Applebaum Network diagram
a Local Account Name
Which of the following are the three components of the fire triangle?
Heat/Fuel/Oxygen
Fire/Combustion/Oxygen
Heat/Combustion/Oxygen
Fire/Fuel/Oxygen
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Diffe-Hillman's Axiom
Rijndael's Challenge
Moore's Law
Kerckhoff's Principle
Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.
Biometric authentication is most often hampered by:
Cost to implement
Rings/Weight change
Initial Registration
User acceptance
Which access control includes motion detectors?
Authentication