Give us your feedback!
Question:
Which of the following is primarily focused on restoring systems and information?
Response:
Recovery
Compensating
Preventative
Detective
Corrective
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
John's computer access changed with his reassignment to a new department. This is an example of:
Mandatory access control
Role-based access control
Access List Control
Need-to-Know control
Owner set access control
How many levels are there in the latest (June 2013) OSI model?
10
5
8
6
7
A WAN is
a Working Authentication Name
a Wide Area Network
the Westinghouse Address Naming convention
one of the Wilson-Adder Need types
a Wide Array Node
Which of the following would be the least useful in attempting to crack a password?
brute force/dictionary attack
MAC the Knife
LophtCrack
John the Ripper
Packet sniffing
A LAN is
a Local Area Network
a Linear Applebaum Network diagram
a Least Access Notification
a Local Account Name
a Local Authentication Node
Which classification of fuel type is gasoline given?
B
C
A
D
Which of the following is immediately above the Transport Layer in the OSI model:
Session
Network
Presentation
Datalink
Bell-La Padula focuses primarily on:
Confidentialty
Accessibility
Authentication
Data Integrity
Which access control includes cameras?
Organizational
Administrative
Technical
Physical
Visual
Owner-set permissions are an example of:
Clark-Wilson
mandatory access control
Discretionary access control
role-based access control
What OSI Layer includes data encryption?
Application
Transport
Which classification of fuel type is wood given?
Match the following control types to their purposes
Reducing Risk
Correcting violations and incidents
Corrective controls also help improve existing preventative and detective controls
Discouraging violations
Deterrent
Providing alternate ways of accomplishing a task
Restoring systems and information