Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

8

6

7

5

10

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

B

A

C

D

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

SONET

MPLS

Frame Relay

SMDS

ATM

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Owner

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Network

Transport

Data Link

Session

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Administrative

Technical

Physical

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Technical

Organizational

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Recovery

Detective

Corrective

Compensating

Preventative

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Physical

Technical

Organizational

Authentication

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Data Integrity

Availability

Authentication

Confidentialty

Accessibility

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Compensating

Corrective

Preventative

Detective

Recovery

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Operating System Controls/Policies

System Access Controls

Firewalls/IPS

Access Control Lists

Data Access Controls

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Retinal imagery

Voice

Ear shape/pattern

Hand shape/pattern