Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Physical

Session

Transport

Network

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Hand shape/pattern

Voice

Retinal imagery

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

Discretionary access control

role-based access control

Clark-Wilson

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

brute force/dictionary attack

Packet sniffing

LophtCrack

John the Ripper

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Organizational

Administrative

Technical

Physical

Owner

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

ESD Blanket

CO2

Soda Acid

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

CHAP

LDAP

EAP

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Corrective

Preventative

Compensating

Recovery

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Session

Datalink

Presentation

Score 0 of 1

Question:

What is the ideal humidity level for a data center?

Response:

30-50%

40-60%

20-40%

60-80%

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Role-based access control

Mandatory access control

Access List Control

Need-to-Know control

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

Frame Relay

ATM

MPLS

SONET

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Owner

Organizational

Administrative

Technical

Physical

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

KERBEROS

SESAME

OpenVPN