SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Access
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 45 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Error caused by biometrics where the system rejects authorized individuals - also know as false rejection rate (FRR)
type I
crossover error rate
password cracking
mantrap
2. Information classification is no write up - no read down
corrective
authentication methods
Biba
rainbow table
3. Cognitive - dynamic - one-time - passphrase
password policy
brute force
password types
corrective
4. User - programs - processes - requesting permissions are access control ________
authentication methods
subjects
type II
type I
5. Security controls that fix a problem or prevent further damage
asynchronous
ACLs
corrective
password policy
6. Authentication method that include pin - password - code words - personal information
ACLs
asynchronous
mantrap
something you know
7. Tailgating - piggybacking - social engineering
cognitive
brute force
physical access control issues
type II
8. Data - hardware - networks - facility are access control ________
objects
access control models
something you know
rainbow table
9. Token that generates a password based on time or event
password cracking
have
synchronous
corrective
10. Lists of permission associated with objects - used in the DAC model - typically include a implicit deny rule
multifactor
systems
detective
ACLs
11. Access control model concerned with information integrity
hybrid
Biba
crossover error rate
password policy
12. The point at which the false rejection rate equals the false acceptance rate - used to determine the accuracy of biometric systems - low value = high accuracy
Biba
subjects
detective
CER
13. Security controls that thwart a security breach - i.e. require user ID and password
brute force
preventative
CER
systems
14. Access control model that does not allow data to be accessed directly - concerned with separation of duty or function
access control models
hybrid
detective
Clark Wilson
15. Password length/complexity help defend against this attack
synchronous
one time
brute force
Bell La Padula
16. Form of authentication that relies on human characteristic - fingerprint - hand geometry - facial recognition - eye scan - voice print - DNA - something you _________
ACLs
are
dictionary
Bell La Padula
17. A small room with two authentication doors - after gaining access to the 1st door the subject is locked in until access to granted to the 2nd door
mantrap
password types
authentication methods
asynchronous
18. Set of rules enforced by an OS to enhance security by forcing users to employ strong passwords
objects
group policy
preventative
password policy
19. The process of recovering passwords from stored/transmitted data
password cracking
cognitive
4 steps of access control
implicit deny
20. Information classification is no read up - no write down
systems
crossover error rate
Bell La Padula
have
21. A password attack that encrypts all the words in the dictionary and compares the resulting hash values with those of the password
dictionary
are
common locks
Clark Wilson
22. Builds on the dictionary attack by adding numbers and special characters and does some common substitution
something you know
Biba
hybrid
objects
23. ACL stands for...
hybrid
password types
objects
access control list
24. Using three or more authentication methods
multifactor
brute force
Clark Wilson
rainbow table
25. Data can only be accessed through applications - designed to prevent unauthorized modification - errors and fraud
common locks
synchronous
Biba
Clark Wilson
26. Security controls that spot and capture details about a security breach - i.e. a log file
physical access control issues
detective
two factor
Biba
27. Procedures -processes - controls that determine access are access control ________
systems
detective
group policy
Bell La Padula
28. Access control model designed to prevent authorized access to classified information - concerned with information confidentiality
rainbow table
have
type I
Bell La Padula
29. Preset (key in knob) - deadbolt - combination padlock - cipher
common locks
preventative
Clark Wilson
multifactor
30. Token that generates a password based on challenge/response
are
CER
corrective
asynchronous
31. The most popular form of authentication
something you know
rainbow table
are
systems
32. Feature of an OS that allows for logical access control by grouping subjects with common characteristics
Bell La Padula
password cracking
one time
group policy
33. CER stands for...
objects
crossover error rate
two factor
brute force
34. Password type that best defends against password attacks - i.e. tokens
two factor
rainbow table
access control models
one time
35. Using any two authentication methods
detective
access control models
two factor
4 steps of access control
36. A password attack that uses a look up table containing pre-computed hashes
rainbow table
Clark Wilson
CER
brute force
37. MAC - DAC - and RBAC
access control models
password attacks
4 steps of access control
type II
38. Form of physical authentication - id/smart card - atm card - token - key - passport - something you __________
Clark Wilson
have
something you know
group policy
39. Something you know - have - are or location
password cracking
Biba
authentication methods
Bell La Padula
40. Identification - authentication - authorization - accountability
Bell La Padula
4 steps of access control
common locks
access control models
41. Dictionary - hybrid - brute force - rainbow table
brute force
synchronous
asynchronous
password attacks
42. A password attack that tries all possible combinations until the correct password is identified
brute force
something you know
objects
access control models
43. Error caused by biometrics where the system accepts impostors - also know as false acceptance rate (FAR)
dictionary
type II
something you know
physical access control issues
44. Used by most ACLs - also known as deny by default
implicit deny
something you know
password policy
group policy
45. Password type based on fact or opinion based information - best for authentication that users do not use often - easy to remember
Bell La Padula
subjects
Biba
cognitive