Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Discretionary access control

Clark-Wilson

mandatory access control

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Organizational

Physical

Technical

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Badge Scanning

Finger scanning

Iris Scanning

Hand scanning

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

A

C

B

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Network

Transport

Physical

Data Link

Session

Score 1 of 1

Question:

A WAN is

Response:

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

a Wide Area Network

a Working Authentication Name

a Wide Array Node

Score 1 of 1

Question:

Which access control includes training?

Response:

Administrative

Physical

Organizational

Technical

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Technical

Physical

Organizational

Administrative

Owner

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Ear shape/pattern

Voice

Retinal imagery

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Owner set access control

Need-to-Know control

Role-based access control

Access List Control

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Datalink

Transport

Presentation

Application

Network

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Application

Network

Data Link

Session

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Detective

Corrective

Recovery

Compensating