Give us your feedback!
Question:
Which of the following packet switched networks uses HDLC?
Response:
MPLS
SONET
Frame Relay
SMDS
ATM
Which access control includes motion detectors?
Authentication
Administrative
Organizational
Physical
Technical
Which of the following is a remote authentication system?
SESAME
KERBEROS
OpenVPN
TACACS
John's computer access changed with his reassignment to a new department. This is an example of:
Mandatory access control
Owner set access control
Need-to-Know control
Access List Control
Role-based access control
Match the following terms and definitions
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Corrective
Intended to bring the environment back to production levels
Recovery
Identify an incidents activities
Detective
Alternate measures of control
Compensating
Which classification of fuel type are electrical fires given?
C
A
D
B
Which of the following is NOT an example of biometric identification?
Retinal imagery
Hand shape/pattern
Voice
Ear shape/pattern
Which classification of fuel type is a computer given?
Which of the following are the three components of the fire triangle?
Fire/Combustion/Oxygen
Heat/Combustion/Oxygen
Heat/Fuel/Oxygen
Fire/Fuel/Oxygen
Which access control includes intrusion detection?
Owner
Techincal
Owner-set permissions are an example of:
Discretionary access control
mandatory access control
Clark-Wilson
role-based access control
Match the following control types to their purposes
Reducing Risk
Preventative
Correcting violations and incidents
Corrective controls also help improve existing preventative and detective controls
Discouraging violations
Providing alternate ways of accomplishing a task
Restoring systems and information
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
Exposure
A proxy server
Countermeasure
How many levels are there in the latest (June 2013) OSI model?
6
10
5
7
8