Give us your feedback!
Question:
Which of the following is the highest in the OSI model:
Response:
Transport
Data Link
Presentation
Physical
Network
Which of the following is primarily focused on restoring systems and information?
Compensating
Recovery
Detective
Preventative
Corrective
Which of the following is NOT an example of SSO?
LDAP
KErberos
SESAME
KryptoKnight
Owner-set permissions are an example of:
role-based access control
mandatory access control
Clark-Wilson
Discretionary access control
Bell-La Padula focuses primarily on:
Accessibility
Confidentialty
Data Integrity
Availability
Authentication
Which of the following is a remote authentication system?
TACACS
KERBEROS
OpenVPN
Which of the following is primarily focused on reducing risk?
Deterrent
Match the following terms to definitions
Training, configuration management of documentation, risk management
Administrative controls
Firewalls, IDS, encryption
Technical controls
Lighting, Fencing, guard patrols
Physical Controls
Which classification of fuel type are electrical fires given?
A
C
D
B
Which of the following would be the least useful in attempting to crack a password?
MAC the Knife
John the Ripper
LophtCrack
Packet sniffing
brute force/dictionary attack
Which access control includes training?
Organizational
Administrative
Technical
Which OSI layer includes the LLC and MAC sub-layers?
Session
Biometric authentication is most often hampered by:
Cost to implement
Rings/Weight change
User acceptance
Initial Registration
More key terms from Chapter 2
Weakness or lack of a countermeasure
Exposure
Entity that can exploit a vulnerability
Threat
The danger of having a vulnerability exploited
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Match the following terms and definitions
Intended to discourage a potential attacker
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Intended to bring the environment back to production levels
Identify an incidents activities
Alternate measures of control