Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Corrective

Deterrent

Detective

Recovery

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

SMDS

SONET

Frame Relay

MPLS

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Presentation

Physical

Network

Data Link

Transport

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Administrative

Technical

Physical

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Physical

Transport

Session

Network

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

MPLS

Frame Relay

SONET

SMDS

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Retinal imagery

Voice

Hand shape/pattern

Ear shape/pattern

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

Water

ESD Blanket

Soda Acid

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Technical controls

Administrative controls

Physical controls

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Authentication

Accountability

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Network

Session

Presentation

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

CHAP

LDAP

PAP

EAP

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Network

Application

Datalink

Transport