CBKR Flashcards
- Copyright provides what form of protection:
A. Protects an author’s right to distribute his/her works.
B. Protects information that provides a competitive advantage.
C. Protects the right of an author to prevent unauthorized use of his/her works.
D. Protects the right of an author to prevent viewing of his/her works.
C. Protects the right of an author to prevent unauthorized use of his/her works.
- Which of the following describes the first step in establishing an encrypted session
using a Data Encryption Standard (DES) key?
A. Key clustering
B. Key compression
C. Key signing
D. Key exchange
D. Key exchange
- A CISSP may face with an ethical conflict between their company’s policies and the (ISC)2 Code of Ethics. According to the (ISC)2 Code of Ethics, in which order of
priority should ethical conflicts be resolved?
A. Duty to principals, profession, public safety, and individuals.
B. Duty to public safety, principals, individuals, and profession.
C. Duty to profession, public safety, individuals, and principals.
D. Duty to public safety, profession, individuals, and principals.
B. Duty to public safety, principals, individuals, and profession.
11. Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to? A. Discretionary Access Control B. Task-initiated Access Control C. Subject-dependent Access Control D. Token-oriented Access Control
A. Discretionary Access Control
12. In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by: A. Protection Profile. B. Target of Evaluation. C. Evaluation Assurance Level 3. D. Evaluation Assurance Level 7.
A. Protection Profile.
- Configuration management provides assurance that changes…?
A. to application software cannot bypass system security features.
B. do not adversely affect implementation of the security policy.
C. to the operating system are always subjected to independent validation and verification.
D. in technical documentation maintain an accurate description of the Trusted Computer Base.
B. do not adversely(不利地) affect implementation of the security policy.
- All of the following methods ensure the stored data are unreadable except…?
A. writing random data over the old file.
B. physical alteration of media.
C. degaussing the disk or tape.
D. removing the volume header information.
D. removing the volume header information.
- What determines the assignment of data classifications in a mandatory access control
(MAC) philosophy?
A. The analysis of the users in conjunction with the audit department
B. The assessment by the information security department
C. The user’s evaluation of a particular information element
D. The organization’s published security policy for data classification
D. The organization’s published security policy for data classification
- Which of the following is the primary goal of a security awareness program?
A. It provides a vehicle for communicating security procedures.
B. It provides a clear understanding of potential risk and exposure.
C. It provides a forum for disclosing exposure and risk analysis.
D. It provides a forum to communicate user responsibilities.
B. It provides a clear understanding of potential risk and exposure. # A:它提供了一種傳達安全程序的工具。 B.它提供了對潛在風險和暴露的清晰了解。 C.它提供了一個公開暴露和風險分析的論壇。 D.它提供了一個交流用戶責任的論壇。
- Which of the following evidence collection method is most likely accepted in a court case?
A. Provide a full system backup inventory.
B. Create a file-level archive of all files.
C. Provide a mirror image of the hard drive.
D. Copy all files accessed at the time of the incident.
C. Provide a mirror image of the hard drive.
- Which of the following characteristics is not of a good stream cipher?
A. Long periods of no repeating patterns.
B. Statistically predictable.
C. Keystream is not linearly related to the key.
D. Statistically unbiased keystream.
B. Statistically predictable.
- When a security administrator wants to conduct regular test on the strength of user passwords, what may be the best setup for this test?
A. A networked laptop with Rainbow table that have direct access to the live password database.
B. A standalone workstation with Rainbow table and a copied password database.
C. A networked workstation with Rainbow table and a copied password database.
D. This is not possible, because the password database is encrypted.
B. A standalone workstation with Rainbow table and a copied password database.
- Which answer lists the proper steps required to develop a disaster recovery and business continuity plan (DRP/BCP)?
A. Project initiation, business impact analysis, strategy development, plan development, testing, maintenance.
B. Strategy development, project initiation, business impact analysis, plan development, testing, maintenance.
C. Business impact analysis, project initiation, strategy development, plan development, testing, maintenance.
D. Project initiation, plan development, business impact analysis, strategy development, testing, maintenance.
A. Project initiation, business impact analysis, strategy development, plan development, testing, maintenance.
- An information security program should include the following elements:
A. Disaster recovery and business continuity planning, and definition of access control requirements and human resources policies.
B. Business impact, threat and vulnerability analysis, delivery of an information security awareness program, and physical security of key installations.
C. Security policy implementation, assignment of roles and responsibilities, and information asset classification.
D. Senior management organizational structure, message distribution standards, and procedures for the operation of security management systems.
C. Security policy implementation, assignment of roles and responsibilities, and information asset classification.
- Security of an automated information system is most effective and economical if the system is…?
A. optimized prior to addition of security.
B. customized to meet the specific security threat.
C. subjected to intense security testing.
D. designed originally to meet the information protection needs.
D. designed originally to meet the information protection needs.
- It is important that information about an ongoing computer crime investigation be…?
A. destroyed as soon after trial as possible.
B. reviewed by upper management before being released.
C. replicated to a backup system to ensure availability.
D. limited to as few people as possible.
D. limited to as few people as possible.
- Which answer is not true for Diffie-Hellman algorithm?
A. Security stems from the difficulty of calculating the product of two large prime numbers.
B. It was the first public key exchange algorithm.
C. It is vulnerable to man-in-the-middle attacks.
D. It is used for distribution of a shared key, not for message encryption and decryption.
A. Security stems from the difficulty of calculating the product of two large prime numbers.
- After signing out a laptop computer from the company loaner pool, you discovered there is a memorandum stored in the loaner laptop written to a competitor containing sensitive information about a new product your company is about to release. Based on the (ISC)2 Code of Ethics, what is the first action you should take?
A. Delete the memorandum from the laptop to ensure no one else will see it.
B. Contact the author of the memorandum to let him/her know the memorandum was on the laptop.
C. Immediately inform your company’s management of your findings and its potential ramifications.
D. Inform the security awareness trainers that data disclosure prevention in a mobile computing environment needs to be added to their classes.
C. Immediately inform your company’s management of your findings and its potential ramifications.
44. What is the trusted registry that guarantees the authenticity of client and server public keys? A. Public key notary. B. Certification authority. C. Key distribution center. D. Key revocation certificate.
B. Certification authority.
45. The concept that all accesses must be mediated, protected from unauthorized modification, and verifiable as correct is implemented through what? A. A security model. B. A reference monitor. C. A security kernel. D. A trusted computing base.
C. A security kernel.
- During a disaster or emergency, how does a closed-circuit television (CCTV) help management and security to minimize loss?
A. It helps the management to direct resources to the hardest hit area.
B. It records instances of looting and other criminal activities.
C. It documents shortcomings of plans and procedures.
D. It captures the exposure of assets to physical risk.
A. It helps the management to direct resources to the hardest hit area.
- The goal of cryptanalysis is to…?
A. forge coded signals that will be accepted as authentic.
B. ensure that the key has no repeating segments.
C. reduce the system overhead for cryptographic functions.
D. determine the number of encryption permutations required.
A. forge coded signals that will be accepted as authentic.
- Which one of the followings cannot be identified by a business impact analysis (BIA)?
A. Analyzing the threats associated with each functional area.
B. Determining risks associated with threats.
C. Identifying major functional areas of information.
D. Determining team members associated with disaster planning.
D. Determining team members associated with disaster planning.
- Pretty Good Privacy (PGP) provides…?
A. confidentiality, integrity, and authenticity.
B. integrity, availability, and authentication.
C. availability, authentication, and non-repudiation.
D. authorization, non-repudiation, and confidentiality.
D. authorization, non-repudiation, and confidentiality.
- Which of the following can be identified when exceptions occur using operations security detective controls?
A. Unauthorized people seeing printed confidential reports.
B. Unauthorized people destroying confidential reports.
C. Authorized operations people performing unauthorized functions.
D. Authorized operations people not responding to important console messages.
C. Authorized operations people performing unauthorized functions.
- Before powering off a computer system, a computer crime investigator should record contents of the monitor and…?
A. save the contents of the spooler queue.
B. dump the memory contents to a disk.
C. backup the hard drive.
D. collect the owner’s boot up disks.
B. dump the memory contents to a disk.
- A security planning process must defines: how security will be managed, who will be responsible, and…?
A. what practices are reasonable and prudent(謹慎) for the enterprise.
B. who will work in the security department.
C. what impact security will have on the intrinsic value of data.
D. how security measures will be tested for effectiveness.
A. what practices are reasonable and prudent(謹慎) for the enterprise.
- A security policy provides a way to…?
A. establish a cost model for security activities.
B. allow management to define system recovery requirements.
C. identify and clarify security goals and objectives.
D. enable management to define system access rules.
C. identify and clarify security goals and objectives.
- Separation of duties should be…?
A. enforced in all organizational areas.
B. cost justified for the potential for loss.
C. enforced in the program testing phase of application development.
D. determined by the availability of trained staff.
B. cost justified for the potential for loss.
- In IPsec, what is the standard format that helps to establish and manage the security association (SA) between two internetworking entities?
A. Internet Security Association and Key Management Protocol (ISAKMP)
B. Internet Key Exchange (IKE)
C. Diffie-Hellman Key Exchange
D. Authentication Header (AH)
B. Internet Key Exchange (IKE)
- Which of the following is true about information that is designated with the highest level of confidentiality in a private sector organization?
A. It is limited to named individuals and creates an audit trail.
B. It is restricted to those in the department of origin for the information.
C. It is available to anyone in the organization whose work relates to the subject and requires authorization for each access.
D. It is classified only by the information security officer and restricted to those who have made formal requests for access.
A. It is limited to named individuals and creates an audit trail.
- When verifying key control objectives of a system design, the security specialist should ensure that the…?
A. final system design has security administrator approval.
B. auditing procedures have been defined.
C. vulnerability assessment has been completed.
D. impact assessment has been approved.
C. vulnerability assessment has been completed.
80. An instance of being exposed to losses is called? A. Vulnerably B. Threat C. Risk D. Exposure
D. Exposure
- Reference monitor requires which of the following conditions?
A. Policy, mechanism and assurance
B. Isolation, layering and abstraction
C. Isolation, completeness and verifiability
D. Confidentiality, availability and integrity
C. Isolation, completeness and verifiability
82. A person in possession of a sample of ciphertext and corresponding plaintext is capable of what type of attack? A. Known-plaintext B. Ciphertext only C. Chosen-plaintext D. Plaintext
A. Known-plaintext
- When there is a “separation of duties”, parts of tasks are assigned to different people
so that:
A. Collusion is required to perform an unauthorized act.
B. Better planning is required to break into systems.
C. Defense-in-depth is achieved by creating multiple layers an attacker must circumvent.
D. The weakest link, people, are not easily flipped.
A. Collusion is required to perform an unauthorized act.
- In a typical information security program, who would be responsible for providing reports to the corporate executives and senior management on the effectiveness of the instituted program controls?
A. Auditors
B. Information systems security manager (ISSM)
C. Information systems security officer (ISSO)
D. Information systems security professionals
A. Auditors
- If risk is defined as “the potential that a given threat will exploit vulnerabilities of an asset or group of assets to cause loss or damage to the assets” the risk has all of the following elements except?
A. An impact of assets based on threats and vulnerabilities.
B. Controls addressing the threats.
C. Threats to and vulnerabilities of processes and/or assets.
D. Probabilities of the threats.
B. Controls addressing the threats.