Refresh Page To Play Again!!
Results
HD Quiz powered by harmonic design
#1. The process of converting plaintext data into ciphertext data to prevent loss of confidentiality is known as?
#2. What are two primary controls used by access control systems
#3. This model is a state machine model used for enforcing access control in government and military applications, it enforces confidentiality. No read up, No write down
#4. This Layer of the OSI model provides independence from differences in data representation (encryption) by translating from application to network format, and vice versa
#5. Which Access Control Model uses predefined set of rules used in environments where different levels of security exist.
#6. This Layer of the OSI model provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node
#7. When planning for redundant power sources in a server deployment, which of the following should be purchased? (Select TWO).
Select all that apply:
#8. Which protocol uses a three hand-shake to establish connectivity?
#9. What layer(s) on the OSI Model’s Data and Physical layers corresponding to in the TCP/IP model ?
#10. (MAC) Address spoofing takes place and affects which layer of the OSI model?
#11. This Layer of the OSI model provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
#12. You are currently employed as an Security Administrator and need to be able to grant access for a user based on their assigned job role. The role requires the user to access files at a certain time of the day. Which of the following would you use to accomplish this task?
#13. Well-known Ports are in what range?
#14. Which of the following is the correct order of the OSI Model?
#15. A cryptographic attack based on a database of pre-computed hash values and the original plain text values.
#16. ______ algorithms provide one-way encryption and are sometimes referred to as one-way functions
#17. Hashing algorithms are used to enforce which of the following?
#18. VPN Man-in-the-Middle Attacks take place and affect which layer of the OSI model?
#19. The science of scrambling, or encrypting, data. Which also includes the study of algorithms and other methods that help protect the confidentiality of data is referring to which of the following.
#20. The ___________model provides the most granular level of access control.
Results Back up Top