Give us your feedback!
Question:
Which of the following is a remote authentication system?
Response:
OpenVPN
TACACS
SESAME
KERBEROS
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
SMDS
Frame Relay
ATM
SONET
MPLS
A LAN is
a Linear Applebaum Network diagram
a Least Access Notification
a Local Account Name
a Local Area Network
a Local Authentication Node
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
Which of the following is primarily focused on identifying alternate solutions to achieve a task?
Preventative
Recovery
Detective
Compensating
Corrective
Which of the following would be the least useful in attempting to crack a password?
Packet sniffing
LophtCrack
MAC the Knife
John the Ripper
brute force/dictionary attack
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Diffe-Hillman's Axiom
Moore's Law
Rijndael's Challenge
Kerckhoff's Principle
Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of
Physical controls
Both Technical and Administrative controls
Technical controls
Administrative controls
Match the following terms and definitions
Intended to discourage a potential attacker
Deterrent
Intended to avoid an incident from happening
Preventive
Fixes component or systems after an incident has occurred
Intended to bring the environment back to production levels
Identify an incidents activities
Alternate measures of control
Determining whether a subject can log into a system is an example of
Accountability
Authentication
Authorization
Which access control includes job rotation?
Organizational
Administrative
Physical
Technical
Which classification of fuel type is wood given?
C
A
B
D
Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of
Physical Controls
Both Technical and Administrative
Administrative Controls
Which of the following is immediately above the Transport Layer in the OSI model:
Presentation
Datalink
Network
Session
Which access control includes training?