Overall Questions (15 random)

You got 18 of 19 possible points.
Your score was: 95 %

Question Results

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Technical controls

Physical Controls

Administrative Controls

Both Technical and Administrative

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

Frame Relay

MPLS

SMDS

SONET

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

OpenVPN

KERBEROS

SESAME

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Data Link

Transport

Application

Session

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Recovery

Deterrent

Preventative

Corrective

Detective

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Confidentialty

Availability

Accessibility

Authentication

Address Integrity

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Organizational

Technical

Administrative

Visual

Physical

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Transport

Physical

Session

Network

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Administrative

Owner

Technical

Organizational

Physical

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Access List Control

Role-based access control

Need-to-Know control

Owner set access control

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Accessibility

Confidentialty

Availability

Authentication

Data Integrity

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Techincal

Technical

Organizational

Physical

Owner

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Datalink

Application

Presentation

Network

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

60-80%

20-40%

30-50%

40-60%

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct