Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Owner

Organizational

Physical

Technical

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

mandatory access control

role-based access control

Discretionary access control

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Exposure

incorrect

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Need-to-Know control

Owner set access control

Access List Control

Role-based access control

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Physical controls

Administrative controls

Technical controls

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Technical

Owner

Administrative

Organizational

Physical

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Detective

Recovery

Corrective

Compensating

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SONET

SMDS

MPLS

Frame Relay

ATM

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Data Access Controls

System Access Controls

Access Control Lists

Operating System Controls/Policies

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

C

B

D

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Application

Network

Session

Transport

Data Link

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

User acceptance

Initial Registration

Rings/Weight change

Cost to implement

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

10

8

7

5

6