Overall Questions (15 random)

You got 14 of 15 possible points.
Your score was: 93 %

Question Results

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Physical controls

Both Technical and Administrative controls

Administrative controls

Score 1 of 1

Question:

A LAN is

Response:

a Linear Applebaum Network diagram

a Local Authentication Node

a Local Area Network

a Least Access Notification

a Local Account Name

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Retinal imagery

Ear shape/pattern

Voice

Score 0 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Preventative

Corrective

Compensating

Recovery

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FAR or Type II error

FRA or Type IV error

FRR or Type I error

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Owner set access control

Access List Control

Role-based access control

Need-to-Know control

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Network

Datalink

Presentation

Application

Transport

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Confidentialty

Address Integrity

Accessibility

Availability

Authentication

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the system

network ACL

the owner

the GPO

the role

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Detective

Recovery

Corrective

Preventative

Compensating

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

D

B

A

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Technical

Physical

Administrative

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

Soda Acid

ESD Blanket

CO2