Give us your feedback!
Question:
Which access control requires sensitivity labels on all subjects and objects?
Response:
Discretionary access control
Manager set control
Role-based access control
Mandatory access control
Access List Control
Which of the following is NOT an example of SSO?
KryptoKnight
SESAME
KErberos
LDAP
Determining whether a subject can log into a system is an example of
Authentication
Accountability
Authorization
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
Exposure
A proxy server
Countermeasure
Which classification of fuel type are electrical fires given?
A
D
C
B
Biometric authentication is most often hampered by:
Cost to implement
Rings/Weight change
User acceptance
Initial Registration
Which of the following is primarily focused on identifying alternate solutions to achieve a task?
Detective
Corrective
Preventative
Compensating
Recovery
Which of the following are the three components of the fire triangle?
Fire/Fuel/Oxygen
Heat/Combustion/Oxygen
Fire/Combustion/Oxygen
Heat/Fuel/Oxygen
Falsely rejecting an authorized user is:
FRR or Type I error
FRA or Type IV error
FAR or Type II error
CER or Type III error
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Technical controls
Physical Controls
Both Technical and Administrative
Administrative Controls
Which of the following is not a typical layer 1 topology?
mesh
ring
bus
star
2 layer star
Which access control protects the entire system?
Operating System Controls/Policies
Firewalls/IPS
Access Control Lists
Data Access Controls
System Access Controls
Which access control includes job rotation?
Organizational
Physical
Technical
Administrative
Which of the following would be the least useful in attempting to crack a password?
John the Ripper
brute force/dictionary attack
LophtCrack
Packet sniffing
MAC the Knife
Which of the following is immediately above the Data Link Layer in the OSI model:
Network
Session
Presentation
Transport
Datalink