Give us your feedback!
Question:
Which of the following extinguishing methods is best for a computer or electrical fire?
Response:
Water
Soda Acid
ESD Blanket
CO2
Which classification of fuel type is paper given?
D
C
B
A
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
Exposure
A proxy server
Countermeasure
Determining whether a subject can log into a system is an example of
Authentication
Accountability
Authorization
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which access control includes audit trails?
Administrative
Physical
Technical
Owner
Organizational
Which of the following is immediately above the Data Link Layer in the OSI model:
Session
Transport
Presentation
Datalink
Network
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Physical controls
Technical controls
Administrative controls
Both Technical and Administrative controls
Which OSI layer includes the LLC and MAC sub-layers?
Data Link
Which of the following is the lowest in the OSI model:
How many levels are there in the latest (June 2013) OSI model?
6
8
5
10
7
Which of the following is not a typical layer 1 topology?
bus
star
ring
2 layer star
mesh
Falsely rejecting an authorized user is:
FRA or Type IV error
FRR or Type I error
CER or Type III error
FAR or Type II error
Which of the following is primarily focused on reducing risk?
Deterrent
Detective
Recovery
Preventative
Corrective
Which access control requires sensitivity labels on all subjects and objects?
Discretionary access control
Role-based access control
Manager set control
Access List Control
Mandatory access control