Question set 501 Flashcards
Q.1) Which of the following is the best method of making a new employee aware of security policies of the organization? A. Make security policies awareness a part of the induction program for new employees B. Make security policies an appendix to the appointment letter C. Interview the employee for his/her level of awareness of security policies before you appoint him/her. D. None of the above.
Q.1) Which of the following is the best method of making a new employee aware of security policies of the organization? A. Make security policies awareness a part of the induction program for new employees (Answer) B. Make security policies an appendix to the appointment letter C. Interview the employee for his/her level of awareness of security policies before you appoint him/her. D. None of the above. Explanation Security is the most critical issue when making resources available to the new employee hence it is ideal to make the security policy awareness program a part of the induction program.
Q.2) Which of the following policies will define the rules for user account creation and password creation? A. Business policies B. Security policies C. Organizational policies D. None of the above
Q.2) Which of the following policies will define the rules for user account creation and password creation? A. Business policies B. Security policies (Answer) C. Organizational policies D. None of the above Explanation User account and password must be so created and maintained that it must be very difficult for a hacker to guess and break in to the network. Hence these will be governed by the security policies.
Q.3) If you wish to carry bulk data from one site to another but your data line does not support the required kind of transfer which of the following is your solution? A. Write into a CD ROM B. Perform FTP C. Copy it into several floppies D. None of the above
Q.3) If you wish to carry bulk data from one site to another but your data line does not support the required kind of transfer which of the following is your solution? A. Write into a CD ROM (Answer) B. Perform FTP C. Copy it into several floppies D. None of the above Explanation When bulk data needs to be transferred between sites it is ideal to write it into a CD ROM drive and carry the same.
Q.4) If you require a 24/7 availability in case of disaster which of the following would be an ideal solution for you? A. Server clustering B. Hot site C. File server mirroring D. None of the above
Q.4) If you require a 24/7 availability in case of disaster which of the following would be an ideal solution for you? A. Server clustering B. Hot site (Answer) C. File server mirroring D. None of the above Explanation Hot site is an alternate or a mirror site available for backup and DRP testing.
Q.5) Which of the following backup is slowest to restore ? A. Differential backup B. Incremental backup C. Full backup D. None of the above
Q.5) Which of the following backup is slowest to restore ? A. Differential backup B. Incremental backup (Answer) C. Full backup D. None of the above Explanation Incremental is the fastest of the backup methods (since only files that have been modified since last full back up are backed up) but the slowest of the restore methods.
Q.6) Which of the following will ensure data is available for use even in case of fire on the network site?
Q.6) Which of the following will ensure data is available for use even in case of fire on the network site? Explanation Daily backup ensures that the latest data will be available in case of fire
Q.7) Which of the following is an online security for data storage? A. Data backup B. RAID C. File server mirroring D. None of the above
Q.7) Which of the following is an online security for data storage? A. Data backup B. RAID (Answer) C. File server mirroring D. None of the above Explanation RAID is a data storage scheme that make storage device available in spite of tolerable failure. Data backup is offline fault tolerance and File server mirroring is an availability service
Q.8) Gas based fire suppressants are more safe then the water based fire suppressants on a network site. T/F? A. True B. False
Q.8) Gas based fire suppressants are more safe then the water based fire suppressants on a network site. T/F? A. True (Answer) B. False Explanation Gas based fire suppressants can not only put off various sources of fire it will also not cause the damage that water based suppressant would possibly do on a network site.
Q.9) Which of the following devices would you use to activate power backup during a dip in power or power cut?
Q.9) Which of the following devices would you use to activate power backup during a dip in power or power cut? Explanation Power conditioners are capable of activating power backup systems when situations demand so.
Q.10) Water based fire suppressants are ideal for data centers. T/F?
Q.10) Water based fire suppressants are ideal for data centers. T/F? Explanation Water based power suppressants can cause sever damage to power as well as electronic devices.
Q.11) Voice print biometric is not fool proof. T/F?
Q.11) Voice print biometric is not fool proof. T/F? Explanation Voice print is a complex biometric method but is not fool proof as frequency modulation to achieve a particular voice effect is not difficult. Hence voice print is not very secure.
Q.12) Which of the following are disadvantages with infrared based motion detectors? Choose two
Q.12) Which of the following are disadvantages with infrared based motion detectors? Choose two Explanation Infrared detectors have distance limitation as well as the line-of-sight limitation which stops it from being successful in large premises where line-of-sight is not possible.
Q.13) Which of the following is the best way to secure sensitive data on the server? A. Block all access to servers that store sensitive data (Your Answer) B. Ensure these servers are not visible on the network C. Encrypt sensitive information on the server D. None of the above
Q.13) Which of the following is the best way to secure sensitive data on the server? A. Block all access to servers that store sensitive data (Your Answer) B. Ensure these servers are not visible on the network C. Encrypt sensitive information on the server (Answer) D. None of the above Explanation The best way to secure stored information on the server is to encrypt the sensitive information by using complex algorithms and securing the passwords and making it inaccessible to hackers.
Q.14) Which of the following is true about risk management? A. It is an exercise that analyzes the potential risks an organization runs into when data is leaked to public B. It is a way of analyzing the potential risks to an enterprise C. It is a way of handling situations when the organization runs into a high financial risk. D. None of the above
Q.14) Which of the following is true about risk management? A. It is an exercise that analyzes the potential risks an organization runs into when data is leaked to public (Answer) B. It is a way of analyzing the potential risks to an enterprise C. It is a way of handling situations when the organization runs into a high financial risk. D. None of the above Explanation Risk management is a way of analyzing the situation of potential risk if the confidential data were to be leaked to the public.
Q.15) Which of the following can be referred to as public level data? A. Web site B. Intranet site C. Confidential D. None of the above
Q.15) Which of the following can be referred to as public level data? A. Web site (Answer) B. Intranet site C. Confidential D. None of the above Explanation All information hosted on a web site is usually available for public users and hence can be categorized as public level data
Q.16) Which of the following is true about threat modeling? Choose two A. Thread modeling refers to places where data leak is likely B. Threat modeling refers to people who are likely to leak data C. Threat modeling refers to the threats that are likely to affect the organization D. None of the above
Q.16) Which of the following is true about threat modeling? Choose two A. Thread modeling refers to places where data leak is likely (Missed) B. Threat modeling refers to people who are likely to leak data (Missed) C. Threat modeling refers to the threats that are likely to affect the organization D. None of the above Explanation Threat modeling is a very effective way in which you can analyze the places where data is likely to leak or the people who are likely to leak the data.
Q.17) The key size in RC5 can range from 0 to 255. Y/N? A. Yes B. No
Q.17) The key size in RC5 can range from 0 to 255. Y/N? A. Yes B. No (Answer) Explanation The number of rounds can range from 0-255 whereas the key size will range from 0-2040 bits.
Q.18) Which of the following is the RC2 supposed to replace? A. DES B. 3DES C. Caesar?s code D. None of the following
Q.18) Which of the following is the RC2 supposed to replace? A. DES (Answer) B. 3DES C. Caesar?s code D. None of the following Explanation Originally RC2 is meant to replace the DES algorithm.
Q.19) 3DES is much faster than DES. T/F? A. True B. False
Q.19) 3DES is much faster than DES. T/F? A. True B. False (Answer) Explanation 3DES is a variation of DES and is much slower.
Q.20) Which of the following can make use of IDEA? Choose two. A. Private communication B. Banking C. Industry applications D. Video conferencing
Q.20) Which of the following can make use of IDEA? Choose two. A. Private communication B. Banking (Missed) C. Industry applications (Missed) D. Video conferencing Explanation IDEA is used worldwide in banking and industry applications.
Q.21) Which of the following is required for a brute force attack? A. A specific configuration system meant for these attacks B. A server configuration system at least C. A general purpose daily use computer with usual configuration D. None of the above
Q.21) Which of the following is required for a brute force attack? A. A specific configuration system meant for these attacks B. A server configuration system at least C. A general purpose daily use computer with usual configuration (Answer) D. None of the above Explanation To exercise brute force attack you will need just a usual configuration computer that is being used everyday by regular users.
Q.22) Which of the following can also be done by cryptography? A. Explicitly authenticate the receiver B. Implicitly authenticate the sender C. Rectify a message that has been altered D. None of the above
Q.22) Which of the following can also be done by cryptography? A. Explicitly authenticate the receiver B. Implicitly authenticate the sender (Answer) C. Rectify a message that has been altered D. None of the above Explanation Cryptography can NOT explicitly authenticate sender or rectify the message that has been altered. If this is done the very purpose of cryptography is defeated. Cryptography can provide secrecy to any message and implicitly authenticate the sender.
Q.23) Cryptography without keys is simpler to use than cryptography with keys. T/F? A. True B. False
Q.23) Cryptography without keys is simpler to use than cryptography with keys. T/F? A. True (Answer) B. False Explanation Since Cryptography without keys will require just one enciphering program and one deciphering program it may not be as resource intensive as cryptography with keys and may be simpler to implement than cryptography with keys.
Q.24) Which of the following will be required by cryptography without keys? Choose two. A. A cipher program B. Deciphering program C. A cryptanalyst D. 128-bit key algorithm
Q.24) Which of the following will be required by cryptography without keys? Choose two. A. A cipher program (Missed) B. Deciphering program (Missed) C. A cryptanalyst D. 128-bit key algorithm Explanation Cryptography without keys will not need a key-based algorithm. A cryptanalyst is not required here either. You need one cipher program that will decide upon the complex substitution required for enciphering and also a deciphering program that will be required by the receiver of the message.
Q.25) Which of the following can be termed as a key distribution problem? A. Not knowing to whom the keys have to be distributed B. Not knowing the actual keys to be distributed C. Deciphering the message at the receiving end D. None of the above
Q.25) Which of the following can be termed as a key distribution problem? A. Not knowing to whom the keys have to be distributed B. Not knowing the actual keys to be distributed C. Deciphering the message at the receiving end (Answer) D. None of the above Explanation When a message is encrypted using a certain encryption algorithm that uses a certain bit of keys the related information must be known at the receiving end also if the original message has to be interpreted successfully. The issue of sending the right key to the recipient for the right message is a key distribution issue.
Q.26) Which of the following are symmetric algorithms? Choose two. A. Stream Cipher B. Block Cipher C. Caesar?s Cipher D. None of the above
Q.26) Which of the following are symmetric algorithms? Choose two. A. Stream Cipher (Missed) B. Block Cipher (Missed) C. Caesar?s Cipher D. None of the above Explanation There is no such algorithm as Caesar?s Cipher. Symmetric algorithm can be categorized into two: Stream and block.
Q.27) Which of the following is used by the PGP to create a signature? Choose two A. Public key B. Private key C. Message digest D. Clear text.
Q.27) Which of the following is used by the PGP to create a signature? Choose two A. Public key B. Private key (Missed) C. Message digest (Missed) D. Clear text. Explanation The PGP uses the combination of private key and the message digest to generate the signature.
Q.28) Digital signatures apart from establishing identity provide which of the following? A. Data integrity B. Data security C. Data encryption D. None of the above
Q.28) Digital signatures apart from establishing identity provide which of the following? A. Data integrity (Answer) B. Data security C. Data encryption D. None of the above Explanation Digital signatures help to establish that data was not modified during the transmission hence helping in establishing data integrity.
Q.29) Larger the number of bits in a key higher is the risk of unauthorized decryption. T/F? A. True B. False
Q.29) Larger the number of bits in a key higher is the risk of unauthorized decryption. T/F? A. True B. False (Answer) Explanation Larger the number of bits in a key more complex it is to decrypt a message.
Q.30) Which of the following statements about PGP are true? Choose two. A. It offers high resistance to cryptanalysis B. It is a heterogeneous cryptography system C. It is not a hybrid cryptography system D. It compresses plain text before encypting. E. None of the above
Q.30) Which of the following statements about PGP are true? Choose two. A. It offers high resistance to cryptanalysis (Missed) B. It is a heterogeneous cryptography system C. It is not a hybrid cryptography system D. It compresses plain text before encypting. (Missed) E. None of the above Explanation It is hybrid crypto system that allows for data compression and thus discouraging pattern analysis or cryptanalysis.
Q.31) In Public-key cryptography one key is used for encryption as well as decryption. T/F? A. True B. False
Q.31) In Public-key cryptography one key is used for encryption as well as decryption. T/F? A. True B. False (Answer) Explanation In Public-key cryptography Public key is used for encryption and Private key is used for decryption.
Q.32) Which of the following is a disadvantage when using conventional encryption? A. It is not reliable B. Key distribution C. Key generation D. None of the above
Q.32) Which of the following is a disadvantage when using conventional encryption? A. It is not reliable B. Key distribution (Answer) C. Key generation D. None of the above Explanation When using conventional encryption for transmitting data key distribution between the sending and the receiving end can be a problem
Q.33) If Hi Kid is being represented as Kl Nlg then which of the following is the correct offset value or key value being used here? A. 3 B. 5 C. 4 D. 0
Q.33) If Hi Kid is being represented as Kl Nlg then which of the following is the correct offset value or key value being used here? A. 3 B. 5 C. 4 (Answer) D. 0 Explanation H when offset by 4 will be represented as K I as L K as N D as G. Hence key value or offset value being used here is 4
Q.34) Cipher is a mathematical function used for secure authentication. T/F? A. True B. False
Q.34) Cipher is a mathematical function used for secure authentication. T/F? A. True B. False (Answer) Explanation Cipher is a cryptography algorithm. It is a mathematical function used for the purpose of encryption and decryption.
Q.35) Which of the following is true about Ciphertext? Choose three. A. It is a result of strong cryptography B. It is a result of weak cryptography C. It makes it impossible to retrieve clear text without the help of correct decoding tools. D. It makes it impossible to retrieve clear text. E. Requires extensive computing capability to decode.
Q.35) Which of the following is true about Ciphertext? Choose three. A. It is a result of strong cryptography (Missed) B. It is a result of weak cryptography C. It makes it impossible to retrieve clear text without the help of correct decoding tools. (Missed) D. It makes it impossible to retrieve clear text. E. Requires extensive computing capability to decode. (Missed) Explanation Ciphertext is a result of strong cryptography. It is meant to be so complex that it is impossible to decode without appropriate decoding tools in spite of using extensive computing capabilities.
Q.36) Which of the following is the function of IETF? A. Setup networking standards B. Propose and develop standards relating to computers networks and Internet C. Review security policies for banks D. None of the above.
Q.36) Which of the following is the function of IETF? A. Setup networking standards B. Propose and develop standards relating to computers networks and Internet (Answer) C. Review security policies for banks D. None of the above. Explanation IETF (Internet Engineering Task Force) is responsible for proposing and developing standards relating to computers networks and the Internet.
Q.37) ECC and diffe-Hellman are both asymmetric using public/private keys. T/F? A. True B. False
Q.37) ECC and diffe-Hellman are both asymmetric using public/private keys. T/F? A. True (Answer) B. False Explanation ECC RSA Diffie-Hellman and El Gamal are all asymmetric systems using public/private keys
Q.38) Which of the following relate to information or message integrity? Choose two. A. Prevent information modification during transmission. B. Verification through check sum algorithms. C. Verification through authentication D. Verification through digital signatures.
Q.38) Which of the following relate to information or message integrity? Choose two. A. Prevent information modification during transmission. (Missed) B. Verification through check sum algorithms. (Missed) C. Verification through authentication D. Verification through digital signatures. Explanation Message integrity ensures that he message being transmitted is not being modified enroute. To ensure this a checksum algorithm may be employed at the sending and the receiving end to ensure the message being sent is received in tact.
Q.39) Which of the following statements relating to Digital signatures are true? Choose two. A. It is ideal security for emails B. It can be used for Identification establishment. C. It is an encryption method D. It is an encryption standard
Q.39) Which of the following statements relating to Digital signatures are true? Choose two. A. It is ideal security for emails (Missed) B. It can be used for Identification establishment. (Missed) C. It is an encryption method D. It is an encryption standard Explanation It is ideally meant to establish Identity of the sender and receiver of the information and not to encrypt the information. The most practical implementation of digital signatures would be in emails. It is not any encryption standard.
Q.40) Which of the following can RSA be used for? Choose two. A. Encryption B. Digital signatures C. Certificates D. Tokens
Q.40) Which of the following can RSA be used for? Choose two. A. Encryption (Missed) B. Digital signatures (Missed) C. Certificates D. Tokens Explanation RSA can be used for Encryption and Digital signatures. It is not relevant to certificates and tokens.