Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Cost to implement

Rings/Weight change

User acceptance

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

star

ring

2 layer star

bus

mesh

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Corrective

Recovery

Compensating

Detective

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

SESAME

KErberos

LDAP

KryptoKnight

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Access List Control

Need-to-Know control

Owner set access control

Mandatory access control

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Techincal

Owner

Technical

Physical

Organizational

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Fuel/Oxygen

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

LophtCrack

John the Ripper

brute force/dictionary attack

Packet sniffing

MAC the Knife

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Retinal imagery

Voice

Ear shape/pattern

Hand shape/pattern

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Access List Control

Discretionary access control

Mandatory access control

Role-based access control

Manager set control

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

C

A

B

D

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Technical

Organizational

Administrative

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

LDAP

CHAP

EAP

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Badge Scanning

Hand scanning

Iris Scanning

Finger scanning