Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Manager set control

Role-based access control

Mandatory access control

Access List Control

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KryptoKnight

SESAME

KErberos

LDAP

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

A

D

C

B

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

User acceptance

Initial Registration

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Corrective

Preventative

Compensating

Recovery

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Heat/Fuel/Oxygen

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

FRA or Type IV error

FAR or Type II error

CER or Type III error

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Technical controls

Physical Controls

Both Technical and Administrative

Administrative Controls

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

ring

bus

star

2 layer star

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Operating System Controls/Policies

Firewalls/IPS

Access Control Lists

Data Access Controls

System Access Controls

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Physical

Technical

Administrative

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

John the Ripper

brute force/dictionary attack

LophtCrack

Packet sniffing

MAC the Knife

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Network

Session

Presentation

Transport

Datalink