Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

OpenVPN

TACACS

SESAME

KERBEROS

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SMDS

Frame Relay

ATM

SONET

MPLS

Score 1 of 1

Question:

A LAN is

Response:

a Linear Applebaum Network diagram

a Least Access Notification

a Local Account Name

a Local Area Network

a Local Authentication Node

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Recovery

Detective

Compensating

Corrective

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

LophtCrack

MAC the Knife

John the Ripper

brute force/dictionary attack

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Kerckhoff's Principle

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Both Technical and Administrative controls

Technical controls

Administrative controls

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

A

B

D

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Both Technical and Administrative

Administrative Controls

Technical controls

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Presentation

Datalink

Network

Session

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Physical

Technical

Administrative