Course Exam Flashcards
Which of the following refers to a series of characters used to verify a users identity?
a) token serial number
b) userID
c) password
d) security ticket
C
Which type of access control allows owners to specify who can access their files?
a) mandatory
b) discretionary
c) relational
d) administrative
B
What is the risk of relying solely on proximity cards for access to a secure facility?
a) lost or stolen card may allow an unauthorized person to gain access
b) a proximity card is too easy to duplicate or forge
c) a proximity card does not record time of departure
d) electrical power failure may deny access to all users
A
Which of the following access control types gives “UPDATE” privileges on SQL database objects to specific users or groups?
a) content dependent access control
b) discretionary access control
c) directory access control
d) data control language access control
B
How is misuse detection different from intrusion detection?
a) an intrusion detection system will prevent all attacks by employees and insiders
b) intrusion detection relies on statistical measures to detect unusual behavior
c) in misuse detection the perpetrator has at least on valid account on one of the systems in the network
d) it uses a collection of known attacks to detect intrusion
C
The three primary methods for authentication of a user to a system or network are?
a) passwords, tokens and biometrics
b) authorization, identification, and tokens
c) passwords, encryption and identification
d) identification, encryption and authorization
A
An access system that grants users only those rights necessary for them to perform their work is operating on which security principle?
a) discretionary access
b) least privilege
c) mandatory access
d) separation of duties
B
Three principal approaches for managing access control are
a) discretionary access control, mandatory access control and role based access control
b) discretionary access control, mandatory access control and layer based access protocol (LBAP)
c) mandatory access control, layer based access protocol, and target based access protocol
d) role based access control, layer based access protocol, and target based access protocol
A
To which form of access control is a rule based control mechanism usually related?
a) discretionary access control
b) task initiated access control
c) subject dependent access control
d) token oriented access control
A
Which one of the following can be used to increase the authentication strength of an access control system?
a) multi-party
b) two factor
c) mandatory
d) discretionary
B
What role does biometrics have in logical access control?
a) identification
b) authorization
c) authentication
d) confirmation
C
At what stage of the application development process should the security department first become involved?
a) prior to implementation
b) prior to user acceptance testing (UAT)
c) during unit testing
d) during requirements development
D
When purchasing proprietary software from a vendor, source code escrow can be used to protect against
a) system data loss
b) vendor bankruptcy
c) copyright violation
d) legal liability
B
All of the following are purposes of the change control management process except ensuring that changes are:
a) authorized
b) effective
c) documented
d) correct
B
Security of an automated information system is most effective and economical if the system is
a) optimized prior to addition of security
b) customized to meet the specific security threat
c) subjected to intense security testing
d) designed originally to provide the necessary security
D
Programmed procedures which ensure that valid transactions are processed accurately and only once are referred to as:
a) data installation controls
b) application controls
c) operations controls
d) physical controls
B
which one of the following is an example of hyperlinks spoofing?
a) compromising a web domain name service reference
b) connecting the user to an unexpected website
c) executing hypertext transport protocol (HTTP) secure GET commands
d) starting the users browser on a secured page
B
Configuration management ensures that all changes to a computer system take place in an identifiable and controlled environment and that the changes:
a) to application software cannot bypass system security features
b) do not adversely affect implementation of the security policy
c) to the operating system are always subjected to independent validation and verification
d) in technical documentation maintain an accurate description of the Trusted Computer Base (TCB)
B
Why do vendors publish MD5 hash values when they provide software patches for their customers to download from the Internet?
a) recipients can verify the softwares integrity after downloading
b) recipients can confirm the authenticity of the site from which they are downloading the patch
c) recipients can request future updates to the software by using the assigned hash value
d) recipients need the hash value to successfully activate the new software
A
A worm most frequently spread via
a) user misuse
b) vulnerabilities in software
c) mobile code attacks
d) infected USB drives and wireless access points
B
Which one of the following properties of a transaction processing system ensures that once a transaction completes successfully (commits), the updates survive even if there is a system failure?
a) atomicity
b) consistency
c) isolation
d) durability
D
The initial phase of the system development life cycle would normally include
a) cost-benefit analysis
b) system design review
c) executive project approval
d) project status summary
A
Emergency actions are taken at the beginning stage of a disaster with objectives of preventing injuries, loss of life and
a) determining damage
b) protecting evidence
c) relocating operations
d) mitigating damage
D
Which of the following is a feature of a hot site?
a) the process of relocation of equipment during critical times
b) prepared offsite storage location containing basic facilities such as interface connections and communications
c) fully equipped backup center with external interfaces and communications
d) the primary site for information system processing that is equipped to run hot in continuous availability mode
C
What is the first step to be performed in establishing a DR plan
a) demonstrate adherence to a standard disaster recovery process
b) agree on the goals and objectives of the plan
c) identify applications to be run during a disaster
d) determine the site to be used during a disaster
B
Which one of the following is not identified by a BIA
a) analyzing the threats associated with each functional area
b) determining risks associated with threats
c) identifying major functional areas of information
d) determining team members associated with disaster planning
D
Which one of the following is NOT a valid X.509 V.3 certificate field?
a) subjects public key information
b) subjects X.500 name
c) issuers unique identifier
d) subjects digital signature
D
Which one of the following is an example of a simple substitution algorithm?
a) RSA
b) DES
C) Caesar Cipher
d) blowfish
C
An advantage of asymmetric key cryptography is that
a) it is relatively easy to distribute keys
b) both keys are the same
c) it can be easily implemented in hardware
d) its execution is very fast
A
In which type of cryptoanalytical attack does the opponent have the least amount of information to work with?
a) known plain text
b) cipher text only
c) plain text only
d) chosen cipher text
B
What is the role of asymmetric key cryptography in PKI?
a) it is used for key management
b) it is used for key storage
c) it is used for key generation
d) it is used for key recovery
A
How can a user of digital signatures ensure non-repudiation of delivery of the correct message?
a) sender encrypts the message with the recipients public key and signs it with their own private key
b) sender computes a digest of the message and sends it to a trusted third party who signs it and stores it for later reference
c) senders signs the message and sends it to the recipient and requests return receipt of the email
d) sender gets a digitally signed acknowledgment from the recipient containing a copy or digest of the message
D
Which trusted third party authenticates public encryption keys?
a) public key notary
b) certification authority
c) key distribution center
d) key revocation certificate
B
One goal of cryptanalysis may be to
a) forge coded signals that will be accepted as authentic
b) ensure that the key has no repeating segments
c) reduce the system overhead for cryptographic functions
d) determine the number of encryption permutations required
A
Pretty Good Privacy provides:
a) confidentiality, integrity, authenticity
b) integrity, availability, authentication
c) availability, authentication and non-repudiation
d) authorization, non-repudiation and confidentiality
A
The RSA algorithm is based on
a) calculating the product of two large prime numbers
b) calculating discreet logarithms in a finite field
c) calculation of least zero weighting
d) calculation of related points on an elliptic curve
A
Which one of the following is the best known example of a symmetric key cipher system
a) DES
b) RSA
c) elgamel (EIG)
d) MD5
A
Which of the following describes the first process in the establishment of an encyrpted session using a DES key?
a) key clustering
b) key compression
c) key signing
d) key exchange
D
Which of the following does a digital signature provide?
a) it provides the ability to encrypt an individuals confidential data
b) it ensures an individuals privacy
c) it identifies the source and verifies the integrity of data
d) it provides a framework for law and procedures
C
The practice of embedding a message in a document, image, video or sound recording so that its existence is hidden is called
a) anonymity
b) steganography
c) shielding
d) data diddling
B