Give us your feedback!
Question:
Which access control includes asset classification?
Response:
Administrative
Owner
Organizational
Physical
Technical
Owner-set permissions are an example of:
Clark-Wilson
mandatory access control
role-based access control
Discretionary access control
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Exposure
The danger of having a vulnerability exploited
Risk
The probability of a threat being realized
Presence of a vulnerability which exposes the organization
Threat
John's computer access changed with his reassignment to a new department. This is an example of:
Mandatory access control
Need-to-Know control
Owner set access control
Access List Control
Role-based access control
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Both technical and administrative controls
Physical controls
Administrative controls
Technical controls
Which access control includes audit trails?
Which of the following is primarily focused on restoring systems and information?
Preventative
Detective
Recovery
Corrective
Compensating
Match the following control types to their purposes
Reducing Risk
Correcting violations and incidents
Corrective controls also help improve existing preventative and detective controls
Discouraging violations
Deterrent
Providing alternate ways of accomplishing a task
Restoring systems and information
Which of the following packet switched networks is best suited to support fully meshed VPNs?
SONET
SMDS
MPLS
Frame Relay
ATM
Which access control protects the entire system?
Firewalls/IPS
Data Access Controls
System Access Controls
Access Control Lists
Operating System Controls/Policies
Which classification of fuel type is a computer given?
A
C
B
D
Which of the following is the lowest in the OSI model:
Application
Network
Session
Transport
Data Link
Biometric authentication is most often hampered by:
User acceptance
Initial Registration
Rings/Weight change
Cost to implement
Match the following terms and definitions
Intended to discourage a potential attacker
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Intended to bring the environment back to production levels
Identify an incidents activities
Alternate measures of control
How many levels are there in the latest (June 2013) OSI model?
10
8
7
5
6