Give us your feedback!
Question:
Match the following key terms
Response:
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which access control includes job rotation?
Technical
Administrative
Physical
Organizational
Which of the following are the three components of the fire triangle?
Heat/Combustion/Oxygen
Heat/Fuel/Oxygen
Fire/Fuel/Oxygen
Fire/Combustion/Oxygen
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
SONET
MPLS
Frame Relay
ATM
SMDS
What OSI Layer includes data compression?
Presentation
Network
Application
Datalink
Transport
In MAC the access policy is set by:
the system
the role
the GPO
network ACL
the owner
Which access control includes intrusion detection?
Owner
Techincal
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Exposure
Which of the following extinguishing methods is best for a computer or electrical fire?
ESD Blanket
CO2
Soda Acid
Water
Which access control includes training?
Which access control includes motion detectors?
Authentication
Which access control requires sensitivity labels on all subjects and objects?
Manager set control
Mandatory access control
Role-based access control
Access List Control
Discretionary access control
A LAN is
a Local Account Name
a Local Area Network
a Linear Applebaum Network diagram
a Local Authentication Node
a Least Access Notification
Which of the following is immediately above the Transport Layer in the OSI model:
Session
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Technical controls
Lighting, Fencing, guard patrols
Physical Controls