Give us your feedback!
Question:
Which of the following is primarily focused on reducing risk?
Response:
Corrective
Recovery
Detective
Deterrent
Preventative
Which of the following is primarily focused on identifying violations and incidents?
Compensating
Bell-La Padula focuses primarily on:
Data Integrity
Authentication
Accessibility
Availability
Confidentialty
Which of the following is NOT a RAW authentication protocol?
LDAP
CHAP
EAP
PAP
Which of the following packet switched networks uses HDLC?
SONET
MPLS
ATM
SMDS
Frame Relay
Which of the following have the best CER?
Hand scanning
Iris Scanning
Finger scanning
Badge Scanning
Determining whether a subject can log into a system is an example of
Accountability
Authorization
Which of the following is immediately above the Data Link Layer in the OSI model:
Transport
Network
Datalink
Presentation
Session
Which access control includes locked doors?
Administrative
Owner
Technical
Organizational
Physical
John's computer access changed with his reassignment to a new department. This is an example of:
Mandatory access control
Access List Control
Role-based access control
Need-to-Know control
Owner set access control
Which of the following is the highest in the OSI model:
Data Link
Clark-Wilson focuses primarily on:
Address Integrity
Match the following terms and definitions
Intended to discourage a potential attacker
Intended to avoid an incident from happening
Fixes component or systems after an incident has occurred
Intended to bring the environment back to production levels
Identify an incidents activities
Alternate measures of control
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
A proxy server
Countermeasure
Work factor is defined as:
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required by an attacker to overcome a protective measure
the amount of effort/time required to maintain an established security plan once it has been implemented