Give us your feedback!
Question:
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Response:
Both Technical and Administrative
Physical Controls
Technical controls
Administrative Controls
Which of the following is NOT an example of SSO?
KryptoKnight
KErberos
SESAME
LDAP
Which of the following is primarily focused on identifying violations and incidents?
Recovery
Detective
Compensating
Preventative
Corrective
Clark-Wilson focuses primarily on:
Availability
Authentication
Address Integrity
Accessibility
Confidentialty
Which of the following is NOT an example of biometric identification?
Ear shape/pattern
Hand shape/pattern
Voice
Retinal imagery
Which of the following are the three components of the fire triangle?
Heat/Combustion/Oxygen
Heat/Fuel/Oxygen
Fire/Combustion/Oxygen
Fire/Fuel/Oxygen
Which access control includes audit trails?
Organizational
Owner
Administrative
Physical
Technical
Which access control includes asset classification?
Match the following key terms
Necessary level of secrecy, unauthorized disclosure is prevented
Confidentiality
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
How many levels are there in the latest (June 2013) OSI model?
8
5
10
6
7
What OSI Layer includes data compression?
Transport
Application
Presentation
Network
Datalink
Which of the following is primarily focused on restoring systems and information?
Which classification of fuel type is gasoline given?
D
B
C
A
Which access control includes training?
Which access control includes intrusion detection?
Techincal