Quiz Summary
0 of 250 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 250 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 250
1. Question
A risk is the likelihood of a threat source taking advantage of a vulnerability to an information system. Risks left over after implementing safeguards is known as:
CorrectIncorrect -
Question 2 of 250
2. Question
Copyright provides what form of protection:
CorrectIncorrect -
Question 3 of 250
3. Question
As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $1 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10% :
CorrectIncorrect -
Question 4 of 250
4. Question
Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key?
CorrectIncorrect -
Question 5 of 250
5. Question
In a typical information security program, what is the primary responsibility of information (data) owner?
CorrectIncorrect -
Question 6 of 250
6. Question
Which of the following is not a component of “chain of evidence”:
CorrectIncorrect -
Question 7 of 250
7. Question
When an employee transfers within an organization …
CorrectIncorrect -
Question 8 of 250
8. Question
A system security engineer is evaluation methods to store user passwords in an information system, so what may be the best method to store user passwords and meeting the confidentiality security objective?
CorrectIncorrect -
Question 9 of 250
9. Question
What is the inverse of confidentiality, integrity, and availability (C.I.A.) triad in risk management?
CorrectIncorrect -
Question 10 of 250
10. Question
A CISSP may face with an ethical conflict between their company’s policies and the (ISC)2 Code of Ethics. According to the (ISC)2 Code of Ethics, in which order of priority should ethical conflicts be resolved?
CorrectIncorrect -
Question 11 of 250
11. Question
Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to?
CorrectIncorrect -
Question 12 of 250
12. Question
In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by:
CorrectIncorrect -
Question 13 of 250
13. Question
As an information systems security manager (ISSM), how would you explain the purpose for a system security policy?
CorrectIncorrect -
Question 14 of 250
14. Question
Configuration management provides assurance that changes…?
CorrectIncorrect -
Question 15 of 250
15. Question
Under what circumstance might a certification authority (CA) revoke a certificate?
CorrectIncorrect -
Question 16 of 250
16. Question
Which of the following entity is ultimately responsible for information security within an organization?
CorrectIncorrect -
Question 17 of 250
17. Question
What type of cryptanalytic attack where an adversary has the least amount of information to work with?
CorrectIncorrect -
Question 18 of 250
18. Question
In business continuity planning, which of the following is an advantage of a “hot site” over a “cold site”
CorrectIncorrect -
Question 19 of 250
19. Question
Which of the following is the most effective method for reducing security risks associated with building entrances?
CorrectIncorrect -
Question 20 of 250
20. Question
All of the following methods ensure the stored data are unreadable except…?
CorrectIncorrect -
Question 21 of 250
21. Question
Prior to installation of an intrusion prevention system (IPS), a network engineer would place a packet sniffer on the network, what is the purpose for using a packet sniffer?
CorrectIncorrect -
Question 22 of 250
22. Question
What determines the assignment of data classifications in a mandatory access control (MAC) philosophy?
CorrectIncorrect -
Question 23 of 250
23. Question
A type cryptographic attack where it is based on the probability of two different messages using the same hash function to produce the same message digest is?
CorrectIncorrect -
Question 24 of 250
24. Question
An access control system that grants users only those rights necessary for them to perform their work is operating on which security principle?
CorrectIncorrect -
Question 25 of 250
25. Question
Which of the following is the primary goal of a security awareness program?
CorrectIncorrect -
Question 26 of 250
26. Question
Which of the following evidence collection method is most likely accepted in a court case?
CorrectIncorrect -
Question 27 of 250
27. Question
Which of the following characteristics is not of a good stream cipher?
CorrectIncorrect -
Question 28 of 250
28. Question
When a security administrator wants to conduct regular test on the strength of user passwords, what may be the best setup for this test?
CorrectIncorrect -
Question 29 of 250
29. Question
When engaging an external contractor for a software development project, source code escrow can be used to protect against…?
CorrectIncorrect -
Question 30 of 250
30. Question
Which answer lists the proper steps required to develop a disaster recovery and business continuity plan (DRP/BCP)?
CorrectIncorrect -
Question 31 of 250
31. Question
Which of the followings is an example of simple substitution algorithm?
CorrectIncorrect -
Question 32 of 250
32. Question
An information security program should include the following elements:
CorrectIncorrect -
Question 33 of 250
33. Question
Which of the following refers to a series of characters used to verify a user’s identity?
CorrectIncorrect -
Question 34 of 250
34. Question
Which e-mail standard relies on “Web of Trust”?
CorrectIncorrect -
Question 35 of 250
35. Question
Security of an automated information system is most effective and economical if the system is…?
CorrectIncorrect -
Question 36 of 250
36. Question
Act of obtaining information of a higher level of sensitivity by combining information from lower level of sensitivity is called?
CorrectIncorrect -
Question 37 of 250
37. Question
Which of the following virus types changes its characteristics as it spreads?
CorrectIncorrect -
Question 38 of 250
38. Question
It is important that information about an ongoing computer crime investigation be…?
CorrectIncorrect -
Question 39 of 250
39. Question
Which answer is not true for Diffie-Hellman algorithm?
CorrectIncorrect -
Question 40 of 250
40. Question
After signing out a laptop computer from the company loaner pool, you discovered there is a memorandum stored in the loaner laptop written to a competitor containing sensitive information about a new product your company is about to release. Based on the (ISC)2 Code of Ethics, what is the first action you should take?
CorrectIncorrect -
Question 41 of 250
41. Question
Job rotation…?
CorrectIncorrect -
Question 42 of 250
42. Question
Which of the following is the least important information to record when logging a security violation?
CorrectIncorrect -
Question 43 of 250
43. Question
Which of the following mechanism is used to achieve non-repudiation of a message delivery?
CorrectIncorrect -
Question 44 of 250
44. Question
What is the trusted registry that guarantees the authenticity of client and server public keys?
CorrectIncorrect -
Question 45 of 250
45. Question
The concept that all accesses must be mediated, protected from unauthorized modification, and verifiable as correct is implemented through what?
CorrectIncorrect -
Question 46 of 250
46. Question
For what reason would a network administrator leverages promiscuous mode on a network interface?
CorrectIncorrect -
Question 47 of 250
47. Question
Which has the flag used for a TCP 3-way handshake?
CorrectIncorrect -
Question 48 of 250
48. Question
During a disaster or emergency, how does a closed-circuit television (CCTV) help management and security to minimize loss?
CorrectIncorrect -
Question 49 of 250
49. Question
The goal of cryptanalysis is to…?
CorrectIncorrect -
Question 50 of 250
50. Question
Which one of the followings cannot be identified by a business impact analysis (BIA)?
CorrectIncorrect -
Question 51 of 250
51. Question
The three primary methods for authenticating users to a system or network are…?
CorrectIncorrect -
Question 52 of 250
52. Question
Pretty Good Privacy (PGP) provides…?
CorrectIncorrect -
Question 53 of 250
53. Question
Which of the following can be identified when exceptions occur using operations security detective controls?
CorrectIncorrect -
Question 54 of 250
54. Question
When downloading software from Internet, why do vendors publish MD5 hash values when they provide software to customers?
CorrectIncorrect -
Question 55 of 250
55. Question
From a legal perspective, which rule must be addressed when investigating a computer crime?
CorrectIncorrect -
Question 56 of 250
56. Question
Before powering off a computer system, a computer crime investigator should record contents of the monitor and…?
CorrectIncorrect -
Question 57 of 250
57. Question
Which of the following transaction processing properties ensures once a transaction completes successfully (commits), the updates survive even if there is a system failure?
CorrectIncorrect -
Question 58 of 250
58. Question
Which of the following is not a symmetric key algorithm?
CorrectIncorrect -
Question 59 of 250
59. Question
A security planning process must defines: how security will be managed, who will be responsible, and…?
CorrectIncorrect -
Question 60 of 250
60. Question
A security policy provides a way to…?
CorrectIncorrect -
Question 61 of 250
61. Question
Which of the following feature does a digital signature provide?
CorrectIncorrect -
Question 62 of 250
62. Question
Computer security is generally considered to be the responsibility of…?
CorrectIncorrect -
Question 63 of 250
63. Question
The practice of embedding a message in a document, image, video or sound recording so that its very existence is hidden is called?
CorrectIncorrect -
Question 64 of 250
64. Question
What characteristic of Digital Encryption Standard (DES) used in Electronic Code Book (ECB) mode makes it unsuitable for long messages?
CorrectIncorrect -
Question 65 of 250
65. Question
Separation of duties should be…?
CorrectIncorrect -
Question 66 of 250
66. Question
What is the advantage of Rivest, Shamir, Adelman (RSA) public key system over the Digital Signature Algorithm (DSA)?
CorrectIncorrect -
Question 67 of 250
67. Question
In IPsec, what is the standard format that helps to establish and manage the security association (SA) between two internetworking entities?
CorrectIncorrect -
Question 68 of 250
68. Question
When securing Internet connections which of the following should be used to protect internal routing and labeling schemes?
CorrectIncorrect -
Question 69 of 250
69. Question
Which of the following describes the step prior to an encrypted session using Data Encryption Standard (DES)?
CorrectIncorrect -
Question 70 of 250
70. Question
What is a set of step-by-step instructions used to satisfy control requirements called?
CorrectIncorrect -
Question 71 of 250
71. Question
The accounting branch of a large organization requires an application to process expense vouchers. Each voucher must be input by one of many accounting clerks, verified by the clerk’s applicable supervisor, then reconciled by an auditor before the reimbursement check is produced. Which access control technique should be built into the application to best serve these requirements?
CorrectIncorrect -
Question 72 of 250
72. Question
What principle recommends division of responsibilities so that one person cannot commit an undetected fraud?
CorrectIncorrect -
Question 73 of 250
73. Question
In what situation would TEMPEST risks and technologies be of most interest?
CorrectIncorrect -
Question 74 of 250
74. Question
Which of the following is true about information that is designated with the highest level of confidentiality in a private sector organization?
CorrectIncorrect -
Question 75 of 250
75. Question
When verifying key control objectives of a system design, the security specialist should ensure that the…?
CorrectIncorrect -
Question 76 of 250
76. Question
What type of controls is not utilized to achieve management directives to protect company assets?
CorrectIncorrect -
Question 77 of 250
77. Question
All of the followings are hashing algorithms except…?
CorrectIncorrect -
Question 78 of 250
78. Question
Security management practice focuses on the continual protection of:
CorrectIncorrect -
Question 79 of 250
79. Question
The likelihood of a threat source taking advantage of a vulnerability is called?
CorrectIncorrect -
Question 80 of 250
80. Question
An instance of being exposed to losses is called?
CorrectIncorrect -
Question 81 of 250
81. Question
Reference monitor requires which of the following conditions?
CorrectIncorrect -
Question 82 of 250
82. Question
A person in possession of a sample of ciphertext and corresponding plaintext is capable of what type of attack?
CorrectIncorrect -
Question 83 of 250
83. Question
Methods of handling risk include all of the followings except:
CorrectIncorrect -
Question 84 of 250
84. Question
Which of the following is not true regarding security policy?
CorrectIncorrect -
Question 85 of 250
85. Question
Which of the following describes the activities that assure protection mechanisms are maintained and operational?
CorrectIncorrect -
Question 86 of 250
86. Question
When there is a “separation of duties”, parts of tasks are assigned to different people so that:
CorrectIncorrect -
Question 87 of 250
87. Question
Which of the following is not a generally accepted benefit of security awareness, training and education?
CorrectIncorrect -
Question 88 of 250
88. Question
Which statement below is an incorrect description of a security control?
CorrectIncorrect -
Question 89 of 250
89. Question
Physical security is accomplished through proper facility construction, fire and water protection, anti-theft mechanisms, intrusion detection systems, and security procedures that are adhered to and enforced. Which of the following is not a component that achieves this type of security?
CorrectIncorrect -
Question 90 of 250
90. Question
In a typical information security program, who would be responsible for providing reports to the corporate executives and senior management on the effectiveness of the instituted program controls?
CorrectIncorrect -
Question 91 of 250
91. Question
What is the difference between quantitative and qualitative risk analysis?
CorrectIncorrect -
Question 92 of 250
92. Question
If risk is defined as “the potential that a given threat will exploit vulnerabilities of an asset or group of assets to cause loss or damage to the assets” the risk has all of the following elements except?
CorrectIncorrect -
Question 93 of 250
93. Question
Which statement below most accurately reflects the goal of risk mitigation?
CorrectIncorrect -
Question 94 of 250
94. Question
Risk analysis allows you to do all of the following except:
CorrectIncorrect -
Question 95 of 250
95. Question
Which of the following is not true with respect to qualitative risk analysis?
CorrectIncorrect -
Question 96 of 250
96. Question
Which choice below is an accurate statement about standards?
CorrectIncorrect -
Question 97 of 250
97. Question
A memory address location specified in a program instruction that contains the address of final memory location is known as:
CorrectIncorrect -
Question 98 of 250
98. Question
Which one of the following hardware devices can be re-programmed?
1. Read Only Memory (ROM).
2. Programmable Read Only Memory (PROM).
3. Erasable Programmable Read Only Memory (EPROM).
4. Electrically Erasable Programmable Read Only Memory (EEPROM).CorrectIncorrect -
Question 99 of 250
99. Question
A processing methodology that executes two or more tasks on a single processor is known as:
CorrectIncorrect -
Question 100 of 250
100. Question
Which of the following is a high-level language?
CorrectIncorrect -
Question 101 of 250
101. Question
Which of the followings are security concerns with distributed systems?
CorrectIncorrect -
Question 102 of 250
102. Question
Trusted Computing Base (TCB) is comprised of what combination of system components?
1. Hardware.
2. Firmware.
3. Software.CorrectIncorrect -
Question 103 of 250
103. Question
Reference monitor _______.
CorrectIncorrect -
Question 104 of 250
104. Question
Which security mode best defines where users have both the required clearance and the need-to-know for all data on a system?
CorrectIncorrect -
Question 105 of 250
105. Question
Otherwise known as a “trap door”, this vulnerability is often built into a system.
CorrectIncorrect -
Question 106 of 250
106. Question
What criteria went into the Common Criteria standard?
CorrectIncorrect -
Question 107 of 250
107. Question
Which of the following is the European evaluation criteria standard?
CorrectIncorrect -
Question 108 of 250
108. Question
In the following top-down Common Criteria evaluation process, what is the missing component:
Protection Profile Target of Evaluation <???> Security Functionality/Assurance Requirements Evaluation Evaluation Assurance Level
A. Certification Domain.
B. Integrity Assessment.
C. Security Domain.
D. Security Target.CorrectIncorrect -
Question 109 of 250
109. Question
A cipher that scrambles letters into different positions is referred to as what?
CorrectIncorrect -
Question 110 of 250
110. Question
The HAVAL algorithms perform what function?
CorrectIncorrect -
Question 111 of 250
111. Question
Which security model focuses on confidentiality only?
CorrectIncorrect -
Question 112 of 250
112. Question
Which of the following includes the definition of procedures for emergency response?
CorrectIncorrect -
Question 113 of 250
113. Question
Which of the following team should be part of the disaster recovery procedures?
CorrectIncorrect -
Question 114 of 250
114. Question
A characteristic of security model that enforces information flow in only one direction is:
CorrectIncorrect -
Question 115 of 250
115. Question
The business continuity planning (BCP) project management and initiation phase does not involve?
CorrectIncorrect -
Question 116 of 250
116. Question
In what way does the RSA algorithm differs from the Data Encryption Standard (DES)?
CorrectIncorrect -
Question 117 of 250
117. Question
Information flow models:
CorrectIncorrect -
Question 118 of 250
118. Question
Which type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25?
CorrectIncorrect -
Question 119 of 250
119. Question
Which device can Forward, Filter, and Flood?
CorrectIncorrect -
Question 120 of 250
120. Question
Which of the following is not a good description of Pretty Good Privacy (PGP)?
CorrectIncorrect -
Question 121 of 250
121. Question
Match the correct network connection speed to the correct standard.
Standard Speed
802.11 ?
802.11b ?
802.11g ?
1. 1 & 2 Mbps
2. 4 & 8 Mbps
3. 11 Mbps
4. 54 MbpsCorrectIncorrect -
Question 122 of 250
122. Question
Which is not a type of service available with ATM?
CorrectIncorrect -
Question 123 of 250
123. Question
MAC (Media Access Control) and LLC (Logical Link Control) have been designated to which layer by the IEEE?
CorrectIncorrect -
Question 124 of 250
124. Question
____ is when a layer 3 packet is modified to fit into a layer 2 network with different characteristics.
CorrectIncorrect -
Question 125 of 250
125. Question
What is the role of asymmetric key cryptography in public key infrastructure (PKI) applications?
CorrectIncorrect -
Question 126 of 250
126. Question
Which routing protocol is used to allow hosts to participate in multicasting?
CorrectIncorrect -
Question 127 of 250
127. Question
ARP and RARP are used to map which?
CorrectIncorrect -
Question 128 of 250
128. Question
Use the unique response from a given system to identify the operating system running on a host is also known as _____.
CorrectIncorrect -
Question 129 of 250
129. Question
Which is the best defense against network sniffing?
CorrectIncorrect -
Question 130 of 250
130. Question
A Smurf attack takes advantage of which of the following?
CorrectIncorrect -
Question 131 of 250
131. Question
Which is not true about fair cryptosystems?
CorrectIncorrect -
Question 132 of 250
132. Question
A system where a user authenticates, is disconnected, and the receiving system connects back to a number in a pre-defined database is also known as which?
CorrectIncorrect -
Question 133 of 250
133. Question
What does Advanced Encryption Standard (AES) do?
CorrectIncorrect -
Question 134 of 250
134. Question
A Sockets (SOCKS) gateways can be classified as which type of firewall?
CorrectIncorrect -
Question 135 of 250
135. Question
RFC 1918 extended IPv4 with the introduction of non-routable addresses in support of which technology below?
CorrectIncorrect -
Question 136 of 250
136. Question
In configuration management, a configuration item is?
CorrectIncorrect -
Question 137 of 250
137. Question
In software development life cycle, the Waterfall Model assumes that…?
CorrectIncorrect -
Question 138 of 250
138. Question
What does the Spiral SDLC Model depicts?
CorrectIncorrect -
Question 139 of 250
139. Question
What can best be described as an abstract machine which it must mediate all access of subjects to objects?
CorrectIncorrect -
Question 140 of 250
140. Question
Which provides a physical connection between the network cabling and the computer’s internal bus?
CorrectIncorrect -
Question 141 of 250
141. Question
What is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept?
CorrectIncorrect -
Question 142 of 250
142. Question
Critical areas should be lighted:
CorrectIncorrect -
Question 143 of 250
143. Question
The percentage of loss a realized threat could have on a certain asset is known as the:
CorrectIncorrect -
Question 144 of 250
144. Question
Referential integrity requires that for any foreign key attribute, the referenced relation must have a tuple with the same value for which of the following?
CorrectIncorrect -
Question 145 of 250
145. Question
Referential integrity requires that for any foreign key attribute, the referenced relation must have a tuple with the same value for which of the following?
CorrectIncorrect -
Question 146 of 250
146. Question
What type of malware is self-contained and it does not need to be part of another computer program to propagate?
CorrectIncorrect -
Question 147 of 250
147. Question
Which of the following represents a prolonged high voltage?
CorrectIncorrect -
Question 148 of 250
148. Question
What type of malware that is capable of infect a file with an encrypted copy of itself, then modify itself when decoded to make almost impossible to detect by signature-based virus scanner?
CorrectIncorrect -
Question 149 of 250
149. Question
A timely review of system access records would be an example of which basic security function?
CorrectIncorrect -
Question 150 of 250
150. Question
Which of the following is a reasonable response from the intrusion detection system when it detects Internet Protocol (IP) packets where the IP source address is the same as the IP destination address?
CorrectIncorrect -
Question 151 of 250
151. Question
A major disadvantage of single sign-on (SSO) is:
CorrectIncorrect -
Question 152 of 250
152. Question
Which of the following can be identified when exceptions occur using operations security detective controls?
CorrectIncorrect -
Question 153 of 250
153. Question
An access system that grants users only those rights necessary for them to perform their work is operating on follows which security principle?
CorrectIncorrect -
Question 154 of 250
154. Question
Three principal schemes that provide a framework for managing access control are
CorrectIncorrect -
Question 155 of 250
155. Question
When a communication link is subject to monitoring, what is the advantage for using an end-to-end encryption solution over link encryption solution?
CorrectIncorrect -
Question 156 of 250
156. Question
To which form of access control is a rule based control mechanism usually related?
CorrectIncorrect -
Question 157 of 250
157. Question
Which of the following does a digital signature provide?
CorrectIncorrect -
Question 158 of 250
158. Question
What role does biometrics have in logical access control?
CorrectIncorrect -
Question 159 of 250
159. Question
When establishing a violation tracking and analysis process, which one of the following parameters is used to keep the quantity of data to manageable levels?
CorrectIncorrect -
Question 160 of 250
160. Question
The accounting branch of a large organization requires an application to process expense vouchers. Each voucher must be input by one of many accounting clerks, verified by the clerk’s applicable supervisor, then reconciled by an auditor before the reimbursement check is produced. What access control technique should be built into the application to meet the information protection needs?
CorrectIncorrect -
Question 161 of 250
161. Question
What best describes two-factor authentication?
CorrectIncorrect -
Question 162 of 250
162. Question
A timely review of system access records would be an example of which basic security function?
CorrectIncorrect -
Question 163 of 250
163. Question
Which protocol makes use of an electronic wallet on a customer’s PC and sends encrypted credit card information to merchant’s Web server, which digitally signs it and sends it on to its processing bank?
CorrectIncorrect -
Question 164 of 250
164. Question
Risk management helps you do all of the followings except:
CorrectIncorrect -
Question 165 of 250
165. Question
Which of the following identifies the encryption algorithm selected by NIST for the new Advanced Encryption Standard (AES)?
CorrectIncorrect -
Question 166 of 250
166. Question
What is the role of internet key exchange (IKE) within the IPsec protocol?
CorrectIncorrect -
Question 167 of 250
167. Question
Which type of attack is based on the probability of two different messages using the same hash function producing a common message digest?
CorrectIncorrect -
Question 168 of 250
168. Question
Which of the following encryption methods is considered unbreakable?
CorrectIncorrect -
Question 169 of 250
169. Question
The Clipper Chip utilizes which concept in public key cryptography?
CorrectIncorrect -
Question 170 of 250
170. Question
Public Key algorithms are:
CorrectIncorrect -
Question 171 of 250
171. Question
Cryptography does not concern itself with:
CorrectIncorrect -
Question 172 of 250
172. Question
Which of the following protects Kerberos against replay attacks?
CorrectIncorrect -
Question 173 of 250
173. Question
Which network topology offers the highest reliability and availability?
CorrectIncorrect -
Question 174 of 250
174. Question
A public key algorithm that does both encryption and digital signature is which of the following?
CorrectIncorrect -
Question 175 of 250
175. Question
Which of the following is the correct calculation?
CorrectIncorrect -
Question 176 of 250
176. Question
Copies of the original discs and other media are considered as what type of evidence?
CorrectIncorrect -
Question 177 of 250
177. Question
Which of the following statement is most accurate of digital signature?
CorrectIncorrect -
Question 178 of 250
178. Question
The Diffie-Hellman algorithm is primarily used to provide which of the following?
CorrectIncorrect -
Question 179 of 250
179. Question
Of the following, which is most true?
CorrectIncorrect -
Question 180 of 250
180. Question
Which security model addresses integrity?
1. Bell-LaPadula.
2. Clark-Wilson.
3. Biba.
4. Chinese Wall.CorrectIncorrect -
Question 181 of 250
181. Question
Of the followings, which is the best description of a digital signature?
CorrectIncorrect -
Question 182 of 250
182. Question
What encryption operation is used when AES uses S-boxes during the process of encryption?
CorrectIncorrect -
Question 183 of 250
183. Question
Which item is the responsibility of key management?
CorrectIncorrect -
Question 184 of 250
184. Question
How many bits make up the effective Data Encryption Standard (DES) key?
CorrectIncorrect -
Question 185 of 250
185. Question
The estimated frequency a threat will occur within a year is known as the:
CorrectIncorrect -
Question 186 of 250
186. Question
What is the Clipper Chip key size?
CorrectIncorrect -
Question 187 of 250
187. Question
When an organization is determining which data is sensitive, it must consider all of the following except:
CorrectIncorrect -
Question 188 of 250
188. Question
Data Encryption Standard (DES) uses which algorithm?
CorrectIncorrect -
Question 189 of 250
189. Question
To speed up RAID disk access, an organization can:
CorrectIncorrect -
Question 190 of 250
190. Question
Which choice below most accurately describes the organization’s responsibilities during an unfriendly termination?
CorrectIncorrect -
Question 191 of 250
191. Question
The concept of least privilege…?
CorrectIncorrect -
Question 192 of 250
192. Question
Which is most likely to help a company detect fraudulent activity:
CorrectIncorrect -
Question 193 of 250
193. Question
Clipping level is all of the followings except:
CorrectIncorrect -
Question 194 of 250
194. Question
Proper change control management involves:
CorrectIncorrect -
Question 195 of 250
195. Question
All of the followings are acceptable for sanitizing data except:
CorrectIncorrect -
Question 196 of 250
196. Question
Trusted recovery may be defined as:
CorrectIncorrect -
Question 197 of 250
197. Question
Which of the following is incorrect with respect to a system cold start:
CorrectIncorrect -
Question 198 of 250
198. Question
Which of the following statements is incorrect:
CorrectIncorrect -
Question 199 of 250
199. Question
____ tunnels NetBEUI and IPX protocols.
CorrectIncorrect -
Question 200 of 250
200. Question
Which of the following statements regarding session hijacking is incorrect:
CorrectIncorrect -
Question 201 of 250
201. Question
Separation of duty can be defeated by:
CorrectIncorrect -
Question 202 of 250
202. Question
Recovery controls attempt to:
CorrectIncorrect -
Question 203 of 250
203. Question
Which of the following questions is less likely to help in assessing physical and environmental protection?
CorrectIncorrect -
Question 204 of 250
204. Question
Security guards are appropriate whenever the function required by the security program involves which of the following?
CorrectIncorrect -
Question 205 of 250
205. Question
______ communications rely on clocking systems at the sending and receiving ends to sync, rather than stop and start bits.
CorrectIncorrect -
Question 206 of 250
206. Question
Which of the following is a “Class A” fire?
CorrectIncorrect -
Question 207 of 250
207. Question
This IPsec mode encapsulates the entire IP packet between IPsec nodes.
CorrectIncorrect -
Question 208 of 250
208. Question
A momentary power outage is a:
CorrectIncorrect -
Question 209 of 250
209. Question
Which security measure would be the best deterrent to the theft of corporate information from a laptop which was left in a hotel room?
CorrectIncorrect -
Question 210 of 250
210. Question
Which of the following is not EPA-approved replacements for Halon?
CorrectIncorrect -
Question 211 of 250
211. Question
Which of the following statements pertaining to fire suppression systems is true?
CorrectIncorrect -
Question 212 of 250
212. Question
Which of the following suppresses combustion through a chemical reaction that kills the fire?
CorrectIncorrect -
Question 213 of 250
213. Question
Which of the following is a “Class C” fire?
CorrectIncorrect -
Question 214 of 250
214. Question
When handling electronic evidence, what is the implementation principle for chain of custody that documents the evidence life cycle?
CorrectIncorrect -
Question 215 of 250
215. Question
Which of the following is a proximity identification device that does not require action by the user and works by responding with an access code to signals transmitted by a reader?
CorrectIncorrect -
Question 216 of 250
216. Question
A momentary high voltage is a:
CorrectIncorrect -
Question 217 of 250
217. Question
A device that supplies power when the commercial utility power system fails is called?
CorrectIncorrect -
Question 218 of 250
218. Question
The ideal operating humidity range is defined as 40 percent to 60 percent. Low humidity (less than 40 percent) can produce what type of problem on computer parts?
CorrectIncorrect -
Question 219 of 250
219. Question
While referring to physical security, what does positive pressurization means?
CorrectIncorrect -
Question 220 of 250
220. Question
Which of the following question is less likely to help in assessing physical access controls?
CorrectIncorrect -
Question 221 of 250
221. Question
The National Institute of Standards and Technology (NIST) standard pertaining to perimeter protection states that critical areas should be illuminated up to?
CorrectIncorrect -
Question 222 of 250
222. Question
Which of the following is true about a “dry pipe” sprinkler system?
CorrectIncorrect -
Question 223 of 250
223. Question
The followings are fire detector types except:
CorrectIncorrect -
Question 224 of 250
224. Question
Which of the following asymmetric encryption algorithm is based on the difficulty of factoring large numbers?
CorrectIncorrect -
Question 225 of 250
225. Question
Under what conditions would the use of a Class C fire suppression system be preferable to the use of a Class A fire suppression system?
CorrectIncorrect -
Question 226 of 250
226. Question
Which of the following recovery issue must be considered in disaster recovery planning (DRP)?
CorrectIncorrect -
Question 227 of 250
227. Question
A business continuity plan (BCP) should have a structure that includes:
CorrectIncorrect -
Question 228 of 250
228. Question
What should take place in order to restore a server, its files and data after a major system failure?
CorrectIncorrect -
Question 229 of 250
229. Question
It is recommended that your disaster recovery plan (DRP) and business continuity plan (BCP) be tested at a minimum of what intervals?
CorrectIncorrect -
Question 230 of 250
230. Question
In addition to preventing loss of life and further injury, what other reason is there to immediately initiate an emergency plan after a disaster?
CorrectIncorrect -
Question 231 of 250
231. Question
When shopping for an off-site backup facility that will ultimately be used to store all your backup media, what is the most important factor to consider?
CorrectIncorrect -
Question 232 of 250
232. Question
What is the primary reason for using one-way hashing algorithms on user passwords?
CorrectIncorrect -
Question 233 of 250
233. Question
What is the most critical factor in the development of a disaster recovery plan (DRP)?
CorrectIncorrect -
Question 234 of 250
234. Question
What is the best description of a structured walk through test?
CorrectIncorrect -
Question 235 of 250
235. Question
Which of the following backup facility is most expensive?
CorrectIncorrect -
Question 236 of 250
236. Question
A business impact analysis would not likely include which of the following tasks?
CorrectIncorrect -
Question 237 of 250
237. Question
What is the effective length of a secret key in the Data Encryption Standard (DES) algorithm?
CorrectIncorrect -
Question 238 of 250
238. Question
If a site needed sporadic access to another network, which would be the best choice?
CorrectIncorrect -
Question 239 of 250
239. Question
Resuming critical business functions includes:
CorrectIncorrect -
Question 240 of 250
240. Question
The admissibility rule requires that evidence must be excluded if:
CorrectIncorrect -
Question 241 of 250
241. Question
Chain of custody is primarily used to:
CorrectIncorrect -
Question 242 of 250
242. Question
A unique packaging method or symbol is a:
CorrectIncorrect -
Question 243 of 250
243. Question
Why is computer crime difficult to investigate:
CorrectIncorrect -
Question 244 of 250
244. Question
Privacy laws generally include which of the following provisions:
CorrectIncorrect -
Question 245 of 250
245. Question
What is the minimum and customary practice of responsible protection of assets that affects a community or societal norm?
CorrectIncorrect -
Question 246 of 250
246. Question
What is the best description of a stream cipher?
CorrectIncorrect -
Question 247 of 250
247. Question
Evidence may be not detected through:
CorrectIncorrect -
Question 248 of 250
248. Question
Which of the following is not a valid X.509 V.3 certificate field?
CorrectIncorrect -
Question 249 of 250
249. Question
Which network protocol uses a “connected” session?
CorrectIncorrect -
Question 250 of 250
250. Question
What are the objectives of emergency actions taken at the beginning stage of a disaster? Preventing injuries, loss of life, and …
CorrectIncorrect