Which of the following threat sources describes the activities carried out by nation
states?
Hacker
Cracker
Script kiddie
Cyberwarfare
Give this one a try later!
Cyberwarfare
In which of the following topologies are all nodes individually connected to a central
connection point?
,Bus
Mesh
Ring
Star
Give this one a try later!
Star
When the responsibility for the payment of loss is placed on a third party, it is called
risk ___________.
avoidance
acceptance
transference
reduction
Give this one a try later!
transference
In which wireless network attack is rouge access point set up to eavesdrop on
wireless communications?
Bluesnarfing
Evil twin
Wardriving
,Bluebugging
Give this one a try later!
Evil twin
Which of the following access control models is the most secure and is used to
protect classified data?
DAC
Non-DAC
MAC
RBAC
Give this one a try later!
MAC
What refers to a forensic principle whereby each movement or transfer of data must
be recorded and logged appropriately?
Chain of custody
Volatility of evidence
Evidence documentation
Evidence analysis
Give this one a try later!
, Chain of custody
Which of the following symmetric key algorithms utilizes 128-bit blocks?
CAST-128
3DES
CAST-256
IDEA
Give this one a try later!
CAST-256
Which of the following RAID levels has no data redundancy?
RAID 1
RAID 5
RAID 3
RAID 0
Give this one a try later!
RAID 0
states?
Hacker
Cracker
Script kiddie
Cyberwarfare
Give this one a try later!
Cyberwarfare
In which of the following topologies are all nodes individually connected to a central
connection point?
,Bus
Mesh
Ring
Star
Give this one a try later!
Star
When the responsibility for the payment of loss is placed on a third party, it is called
risk ___________.
avoidance
acceptance
transference
reduction
Give this one a try later!
transference
In which wireless network attack is rouge access point set up to eavesdrop on
wireless communications?
Bluesnarfing
Evil twin
Wardriving
,Bluebugging
Give this one a try later!
Evil twin
Which of the following access control models is the most secure and is used to
protect classified data?
DAC
Non-DAC
MAC
RBAC
Give this one a try later!
MAC
What refers to a forensic principle whereby each movement or transfer of data must
be recorded and logged appropriately?
Chain of custody
Volatility of evidence
Evidence documentation
Evidence analysis
Give this one a try later!
, Chain of custody
Which of the following symmetric key algorithms utilizes 128-bit blocks?
CAST-128
3DES
CAST-256
IDEA
Give this one a try later!
CAST-256
Which of the following RAID levels has no data redundancy?
RAID 1
RAID 5
RAID 3
RAID 0
Give this one a try later!
RAID 0