Thursday 15 September 2016

CIS 502 Final Exam Solution



Chapter 5:  Cryptography

MULTIPLE CHOICE

  1. The process of transforming cipher text to plaintext is known as:
a.Decryptionc.Key recovery
b.Encryptiond.Hashing


  1. Which of the following statements is true about the Vernam cipher:
a.It is a polyalphabetic cipher
b.It is a running-key cipher
c.The encryption key is used for only one message
d.Another name for it is a one-time hash

More questions hidden...........

Chapter 6:  Legal, Regulations, Compliance and Investigations

MULTIPLE CHOICE

  1. The categories of laws in the U.S. are:
a.Civil, criminal, administrative, and familyc.Criminal, civil, and administrative
b.Intellectual, privacy, and computer crimed.Criminal, civil, and family


  1. Trademarks, copyrights, and patents are all a part of:
a.Intellectual property lawc.Administrative law
b.Civil lawd.Private property law

More questions hidden...........














Chapter 7: Operations Security

MULTIPLE CHOICE

  1. An employee in an organization is requesting access to more information than is required. This request should be denied on the basis of which principle:
a.Separation of dutiesc.Need to know
b.Least privileged.Job rotation



  1. Two separate employees are required to open a safe containing sensitive information. One employee has part of the safe combination, and a second employee has another part of the safe combination. This arrangement follows the principle of:
a.Split custodyc.Need to know
b.Segregation of dutiesd.Least privilege


Chapter 8:  Physical and Environmental Security

MULTIPLE CHOICE

  1. The use of key cards to control physical access to a work facility is a form of:
a.Both preventive and administrative control
b.Detective control
c.Both preventive and detective control
d.Preventive control


  1. A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility. What measure can be used to prevent this?
a.Implement PIN pads at card reader stations
b.Implement video surveillance at card reader stations
c.Implement man traps at card reader stations
d.Implement RFID sensors at card reader stations


Chapter 9:  Security Architecture and Design

MULTIPLE CHOICE

  1. The owners of files and directories on a file server are able to control which personnel may access those files and directories. The access control model that most closely resembles this is:
a.Role based access control (RBAC)c.Discretionary access control (DAC)
b.Mandatory access control (MAC)d.Multilevel access


  1. A resource server contains an access control system. When a user requests access to an object, the system examines the permission settings for the object and the permission settings for the user, and then makes a decision whether the user may access the object. The access control model that most closely resembles this is:
a.Mandatory access control (MAC)c.Non-interference
b.Discretionary access control (DAC)d.Role based access control (RBAC)


Chapter 10:  Telecommunications and Network Security

MULTIPLE CHOICE

  1. A network engineer who is examining telecommunications circuits has found one that is labeled as a DS-1. What is the maximum throughput that may be expected from this circuit?

  1. The size of packets in an ATM networks is:
a.53 bytesc.1544 bytes
b.1500 bytesd.Variable, from 64 to 1500 bytes


No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...