Give us your feedback!
Question:
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Response:
Technical controls
Physical Controls
Administrative Controls
Both Technical and Administrative
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
ATM
Frame Relay
MPLS
SMDS
SONET
Which of the following is a remote authentication system?
TACACS
OpenVPN
KERBEROS
SESAME
Which of the following is the lowest in the OSI model:
Network
Data Link
Transport
Application
Session
Which of the following is primarily focused on reducing risk?
Recovery
Deterrent
Preventative
Corrective
Detective
Clark-Wilson focuses primarily on:
Confidentialty
Availability
Accessibility
Authentication
Address Integrity
Which access control includes cameras?
Organizational
Technical
Administrative
Visual
Physical
Which OSI layer includes the LLC and MAC sub-layers?
Which access control includes audit trails?
Owner
John's computer access changed with his reassignment to a new department. This is an example of:
Mandatory access control
Access List Control
Role-based access control
Need-to-Know control
Owner set access control
Bell-La Padula focuses primarily on:
Data Integrity
Which access control includes intrusion detection?
Techincal
What OSI Layer includes data encryption?
Datalink
Presentation
What is the ideal humidity level for a data center?
60-80%
20-40%
30-50%
40-60%
Match the following cryptology tools and technologies
One-time pads
Manual
Still in use in some instances. Recall, one-time pads are the most secure approach
Enigma machine
Electro-mechanical
Electrical lights, mechanical crank/spinwheel
AES, RSA Algorithms
Electronic
I know, you wanted to think "digital" but technically, electronic works as well
Cipherdisks
Mechanical
Think ceasar's spin wheel here
Single photon emissions
Quantum cryptography
used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night