Protecting Industrial Networks Using Security & Access Controls Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Which of the following access control models are managed by the system owner only?

Question 2 2. Name one of the types of access control.

Question 3 3. What is the first step in the access control process?

Question 4 4. What is used to manage or filter data traffic coming into a network?

Question 5 5. Through which of the following will data pass in order to enter a company's private enterprise network?

Page 2

Question 6 6. This piece of equipment is used to both sound an alarm and shut down portions of a network if an attacker were to successfully gain access to a network.

Question 7 7. Which of the following is NOT an example of a method used in information security?

Question 8 8. Which of the following is NOT an example of an information security management policy or procedure?

Question 9 9. Which of the following is NOT a benefit of an information management security system?

Question 10 10. A multi-layered approach to network security is best because _____.

Page 3

Question 11 11. Which of the following are NOT a method to deliver network security?

Question 12 12. When can a network security hardware appliance stop threats on the network?

Question 13 13. Which of the following refers to methods used to ensure that only authorized individuals have access to specific resources in a network?

Question 14 14. Which of the following is designed so that a person must first cross and close one door before being allowed to go through the next door?

Question 15 15. Which of the following is NOT an example of host security?

Page 4

Question 16 16. Which option below contains the two access controls used to regulate access to information?

Question 17 17. Which option below correctly lists the security principles used when setting up an access control?

Question 18 18. Which option below contains the best definition of an Access Control Matrix?

Question 19 19. One of the commonly used frameworks for information security management is _____

Question 20 20. The various processes involved collectively to protect an organization's information asset is called _____

Page 5

Question 21 21. To ensure that the information security framework is well implemented and aligns with the business needs of Best Stocks, the following best practices as defined by the industry's professional bodies are observed _____

Question 22 22. Which of the following is true?

Question 23 23. Which of the following can cause packet sniffing?

Question 24 24. Which of the following is true?

Question 25 25. Which of the following are benefits of access control?

Page 6

Question 26 26. Someone trying to access information illegally via a company's private network is called what?

Question 27 27. Which of the following information security management system benefits deals with continuous improvement?

Question 28 28. If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?

Question 29 29. Biometrics are at times preferred to passcodes or pins for what reason?

Question 30 30. Which option contains the complete series of access attributes used to indicate actions that may be taken by an individual having access to a file?

Protecting Industrial Networks Using Security & Access Controls Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 330: Critical Infrastructure Security  /  Computer Science Courses
Support