Overall Questions (15 random)

You got 13 of 15 possible points.
Your score was: 87 %

Question Results

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Transport

Data Link

Presentation

Physical

Network

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Compensating

Recovery

Detective

Preventative

Corrective

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KErberos

SESAME

KryptoKnight

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

mandatory access control

Clark-Wilson

Discretionary access control

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Accessibility

Confidentialty

Data Integrity

Availability

Authentication

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

SESAME

TACACS

KERBEROS

OpenVPN

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Corrective

Detective

Recovery

Deterrent

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

A

C

D

B

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

John the Ripper

LophtCrack

Packet sniffing

brute force/dictionary attack

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Physical

Administrative

Technical

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Transport

Physical

Network

Session

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

User acceptance

Initial Registration

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Exposure

incorrect

Entity that can exploit a vulnerability

Threat

incorrect

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct