Chapter 5: Cryptography
MULTIPLE CHOICE
- The process of transforming cipher text to plaintext is known as:
a. | Decryption | c. | Key recovery |
b. | Encryption | d. | Hashing |
- Which of the following statements is true about the Vernam cipher:
a. | It is a polyalphabetic cipher |
b. | It is a running-key cipher |
c. | The encryption key is used for only one message |
d. | Another name for it is a one-time hash |
More questions hidden...........
Chapter 6: Legal, Regulations, Compliance and Investigations
MULTIPLE CHOICE
- The categories of laws in the U.S. are:
a. | Civil, criminal, administrative, and family | c. | Criminal, civil, and administrative |
b. | Intellectual, privacy, and computer crime | d. | Criminal, civil, and family |
- Trademarks, copyrights, and patents are all a part of:
a. | Intellectual property law | c. | Administrative law |
b. | Civil law | d. | Private property law |
More questions hidden...........
Chapter 7: Operations Security
MULTIPLE CHOICE
- An employee in an organization is requesting access to more information than is required. This request should be denied on the basis of which principle:
a. | Separation of duties | c. | Need to know |
b. | Least privilege | d. | Job rotation |
- Two separate employees are required to open a safe containing sensitive information. One employee has part of the safe combination, and a second employee has another part of the safe combination. This arrangement follows the principle of:
a. | Split custody | c. | Need to know |
b. | Segregation of duties | d. | Least privilege |
Chapter 8: Physical and Environmental Security
MULTIPLE CHOICE
- The use of key cards to control physical access to a work facility is a form of:
a. | Both preventive and administrative control |
b. | Detective control |
c. | Both preventive and detective control |
d. | Preventive control |
- A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility. What measure can be used to prevent this?
a. | Implement PIN pads at card reader stations |
b. | Implement video surveillance at card reader stations |
c. | Implement man traps at card reader stations |
d. | Implement RFID sensors at card reader stations |
Chapter 9: Security Architecture and Design
MULTIPLE CHOICE
- The owners of files and directories on a file server are able to control which personnel may access those files and directories. The access control model that most closely resembles this is:
a. | Role based access control (RBAC) | c. | Discretionary access control (DAC) |
b. | Mandatory access control (MAC) | d. | Multilevel access |
- A resource server contains an access control system. When a user requests access to an object, the system examines the permission settings for the object and the permission settings for the user, and then makes a decision whether the user may access the object. The access control model that most closely resembles this is:
a. | Mandatory access control (MAC) | c. | Non-interference |
b. | Discretionary access control (DAC) | d. | Role based access control (RBAC) |
Chapter 10: Telecommunications and Network Security
MULTIPLE CHOICE
- A network engineer who is examining telecommunications circuits has found one that is labeled as a DS-1. What is the maximum throughput that may be expected from this circuit?
- The size of packets in an ATM networks is:
a. | 53 bytes | c. | 1544 bytes |
b. | 1500 bytes | d. | Variable, from 64 to 1500 bytes |
No comments:
Post a Comment
Note: only a member of this blog may post a comment.