SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Network Access
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 45 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Information classification is no write up - no read down
common locks
dictionary
Bell La Padula
Biba
2. Security controls that thwart a security breach - i.e. require user ID and password
multifactor
subjects
preventative
password types
3. User - programs - processes - requesting permissions are access control ________
multifactor
are
rainbow table
subjects
4. Data can only be accessed through applications - designed to prevent unauthorized modification - errors and fraud
Bell La Padula
Clark Wilson
objects
brute force
5. Dictionary - hybrid - brute force - rainbow table
password attacks
common locks
implicit deny
crossover error rate
6. Security controls that fix a problem or prevent further damage
password policy
4 steps of access control
corrective
dictionary
7. Identification - authentication - authorization - accountability
asynchronous
4 steps of access control
two factor
rainbow table
8. Token that generates a password based on challenge/response
mantrap
asynchronous
Clark Wilson
group policy
9. Form of authentication that relies on human characteristic - fingerprint - hand geometry - facial recognition - eye scan - voice print - DNA - something you _________
are
Clark Wilson
password types
Bell La Padula
10. Lists of permission associated with objects - used in the DAC model - typically include a implicit deny rule
dictionary
brute force
systems
ACLs
11. A password attack that uses a look up table containing pre-computed hashes
access control models
type II
rainbow table
cognitive
12. Access control model concerned with information integrity
corrective
Biba
rainbow table
systems
13. Error caused by biometrics where the system rejects authorized individuals - also know as false rejection rate (FRR)
Clark Wilson
mantrap
password policy
type I
14. Data - hardware - networks - facility are access control ________
detective
Bell La Padula
Clark Wilson
objects
15. Tailgating - piggybacking - social engineering
preventative
physical access control issues
systems
Biba
16. The most popular form of authentication
preventative
have
corrective
something you know
17. The process of recovering passwords from stored/transmitted data
corrective
4 steps of access control
password cracking
mantrap
18. Something you know - have - are or location
authentication methods
mantrap
group policy
Clark Wilson
19. Preset (key in knob) - deadbolt - combination padlock - cipher
common locks
ACLs
Biba
group policy
20. Information classification is no read up - no write down
brute force
password attacks
Bell La Padula
objects
21. A small room with two authentication doors - after gaining access to the 1st door the subject is locked in until access to granted to the 2nd door
mantrap
Bell La Padula
CER
detective
22. Feature of an OS that allows for logical access control by grouping subjects with common characteristics
implicit deny
group policy
physical access control issues
Bell La Padula
23. Using three or more authentication methods
corrective
brute force
access control list
multifactor
24. The point at which the false rejection rate equals the false acceptance rate - used to determine the accuracy of biometric systems - low value = high accuracy
authentication methods
detective
CER
common locks
25. Access control model that does not allow data to be accessed directly - concerned with separation of duty or function
Clark Wilson
have
cognitive
rainbow table
26. A password attack that encrypts all the words in the dictionary and compares the resulting hash values with those of the password
preventative
dictionary
common locks
CER
27. CER stands for...
type I
password policy
ACLs
crossover error rate
28. A password attack that tries all possible combinations until the correct password is identified
corrective
brute force
Bell La Padula
group policy
29. ACL stands for...
group policy
multifactor
asynchronous
access control list
30. Form of physical authentication - id/smart card - atm card - token - key - passport - something you __________
authentication methods
preventative
mantrap
have
31. Set of rules enforced by an OS to enhance security by forcing users to employ strong passwords
brute force
physical access control issues
password types
password policy
32. Authentication method that include pin - password - code words - personal information
have
something you know
one time
ACLs
33. Password length/complexity help defend against this attack
have
access control list
brute force
subjects
34. Error caused by biometrics where the system accepts impostors - also know as false acceptance rate (FAR)
type II
cognitive
one time
brute force
35. Procedures -processes - controls that determine access are access control ________
systems
password attacks
Bell La Padula
something you know
36. Security controls that spot and capture details about a security breach - i.e. a log file
detective
are
systems
brute force
37. Cognitive - dynamic - one-time - passphrase
detective
corrective
preventative
password types
38. Token that generates a password based on time or event
CER
something you know
synchronous
brute force
39. Using any two authentication methods
two factor
CER
multifactor
mantrap
40. Password type based on fact or opinion based information - best for authentication that users do not use often - easy to remember
password cracking
access control list
physical access control issues
cognitive
41. Password type that best defends against password attacks - i.e. tokens
one time
two factor
access control list
have
42. Access control model designed to prevent authorized access to classified information - concerned with information confidentiality
common locks
access control models
dictionary
Bell La Padula
43. Used by most ACLs - also known as deny by default
are
crossover error rate
implicit deny
authentication methods
44. MAC - DAC - and RBAC
two factor
access control models
CER
common locks
45. Builds on the dictionary attack by adding numbers and special characters and does some common substitution
systems
hybrid
ACLs
asynchronous