Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

D

A

C

B

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Physical

Owner

Techincal

Administrative

Organizational

Technical

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Technical

Administrative

Organizational

Physical

Authentication

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

D

B

C

A

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Data Link

Application

Network

Transport

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Physical

Organizational

Technical

Visual

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

ESD Blanket

Soda Acid

Water

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Organizational

Administrative

Technical

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

MPLS

Frame Relay

SONET

ATM

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KErberos

KryptoKnight

SESAME

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Technical

Physical

Administrative

Owner

Organizational

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

bus

star

ring

2 layer star

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability