security

Is this your test? Login to manage it. If not, you can make an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security goals is most at risk?
2.
1 point
Smart phones with cameras and Internet capabilites pose a risk to which security goal?
3.
1 point
By definition, which security concept ensures that only authorized parties can access data?
4.
1 point
Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user. Before transmission, you hash the message as a digital signature before sending it to the other user.

In this example, what protection does the hashing activity provide?
5.
1 point
Which of the following is and example of an internal threat?
6.
1 point
What is the greatest threat to the confidentiality of data in most secure organizations?
7.
1 point
which of the following is the correct definition of a threat?
8.
1 point
Which of the following is an example of a vulnerability?
9.
1 point
Which of the following is not a valid concept to associate with integrity?
10.
1 point
When a cryptographic system is used to protect the confidentiality of data, what is actually protected?
11.
1 point
By definition, which security concept uses the ability to prove that a sender sent an encrypted message?
12.
1 point
The company network is protected by a firewall, an IDS, and tight access controls. All of the files on this protected network are copied to tape every 24 hours.

The backup solution imposed on this network is designed to provide protection for what security service?
13.
1 point
Which is the star property of Bell-LaPadula?
14.
1 point
The Clark-Wilson model is primarily based on?
15.
1 point
The Brewer-Nash model is designed primarily to prevent?
16.
1 point
Discretionary Access Control (DAC) manages access to resources using what primary element or aspect?
17.
1 point
What form of access control is based on job descriptions?
18.
1 point
Which access control type is used to implement short-term repairs to restore basic functionality following an attack?
19.
1 point
Encryption is which type of access control?
20.
1 point
Which form of access control enforces security based on user identities and allows individual users to define access controls over owned resources?
21.
1 point
You have implemented an access control method that allows only users who are managers to access specific data.
22.
1 point
You have a system that allows the owner of a file to identify users and their permissions to the file. Which type of access control model is implemented?
23.
1 point
A router access control list uses information in a packet such as the destination IP address and port number to make allow or deny forwarding decisions.
24.
1 point
Which of the following is used for identification?
25.
1 point
Which of the following is the term for the process of validation a subject's identity?
26.
1 point
What type of password is maryhadalittlelamb?
27.
1 point
Which of the following is a password that relates to things that people know, such as mother's maiden name, or the name of pet?
28.
1 point
Which of the following defines the crossover rate for evaluating biometric systems?
29.
1 point
Which of the following conditions is desirable when selecting a biometric system? (SELECT TWO)
30.
1 point
Which of the following is an example of Type 1 (something you know) authentication?
31.
1 point
Which of the following are examples of single sign-on authentication solutions? (SELECT TWO)
32.
1 point
Which of the following is not a characteristic of Kerberos?
33.
1 point
What is another term for the type of logon credentials provided by a token device?
34.
1 point
Which of the following is an example of a single sign-on authentication solution?
35.
1 point
Which of the following is the most common form of authentication?
36.
1 point
Which of the following is the strongest form of multi-factor authentication?
37.
1 point
Which of the following is an example of two-factor authentication?
38.
1 point
Which of the following are examples of Type II (something you have) authentication credentials? (SELECT TWO)
39.
1 point
Which of the following is not a form of biometric?
40.
1 point
Which of the following information is typically not included in an access token?
41.
1 point
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group which has access to a special shared folder.

Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do?
42.
1 point
Which type of media preparation is sufficient for media that will be reused in a different security context within your organization?
43.
1 point
Which security principle prevents any one administrator from having sufficient access to compromise the security of the overall IT solution?
44.
1 point
By assigning access permissions so that users can only access those resources which are required to accomplish their specific work tasks, you would be in compliance with?
45.
1 point
An access control list (ACL) contains a list of users and allowed permissions. What is it called if the ACL automatically prevents access to anyone not on the list?
46.
1 point
You are concerned that the accountant in your organization might have the chance to modify the books and steal from the company. You want to periodically have another person take over all accounting responsibilities to catch any irregularities.

Which solution should you implement?
47.
1 point
Which of the following principles is implemented in a mandatory access control model to determine access to an object using classification levels?
48.
1 point
What should be done to a user account if the user goes on an extended vacation?
49.
1 point
What is the effect of the following command?

chage -M 60 -W 10 jsmith
50.
1 point
Which of the following is the single best rule to enforce when designing complex passwords?