Overall Questions (15 random)

You got 18 of 19 possible points.
Your score was: 95 %

Question Results

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Rijndael's Challenge

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

D

B

A

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Corrective

Compensating

Detective

Preventative

Recovery

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Presentation

Network

Datalink

Transport

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Preventative

Corrective

Detective

Recovery

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Confidentialty

Data Integrity

Authentication

Accessibility

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Application

Network

Data Link

Session

Transport

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRA or Type IV error

CER or Type III error

FRR or Type I error

FAR or Type II error

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

C

D

A

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

CO2

ESD Blanket

Soda Acid

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

C

A

B

D

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

60-80%

20-40%

40-60%

30-50%

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

SMDS

ATM

Frame Relay

SONET