Term Test 2 Flashcards
Which of the following is the most important aspect of security? A. Physical security B. Intrusion detection C. Logical security D. Awareness training
A. Physical Security
What method can be used to map out the needs of an organization for a new facility? A. Log file audit B. Crtical path analysis C. Risk analysis D. Inventory
B. Critical path analysis
What infrastructure component is often located in the same position across multiple floors in order to provide a convenient means of linking floor-based netowrks together? A. Server room B. Wiring closet C. Datacenter D. Media cabinets
B. Wiring closet
What is the most common form of perimeter security devices or mechanisms? A. Security guards B. Fences C. CCTV D. Lighting
D. Lighting
What is the most common cause of failure for water-based fire suppression system?
A. Whater shortage
B. People
C. Ionization detectors
D. Placement of detectors in drop ceilings
B. People
Accountability requires all of the following items except one. Which item is not required for accountability? A. Identification B. Authentication C. Audting D. Authorization
D. Authorization
Which of the following is an example of a Type 2 authentication factor? A. Something you have B. Something you are C. Something you do D. Something you know
A. Something you have
Your organization issues devices to employees. These devices generate one-teim passwords every 60 seconds. A server hosted within th eorganization knows what this password is at any given time. What type of device is this? A. Synchronous token B. Asynchronous token C. Smartcard D. Common access card
A. Synchronous token
A biometric system has falsely rejected a valid user, indicating that the user is not recognized. What type of error is this? A. Type 1 error B. Type 2 error C. Crossover error rate D. Equal error rate
A. Type 1 error
What is the primary purpose of Kerberos? A. Confidentiality B. Integrity C. Authentication D. Accountability
C. Authentication
Which of the following authentication, authorization, and accounting (AAA) protocols is based on RADIUS and supports Mobile IP and Voice over IP? A. Distributed access control B. Diameter C. TACACS+ D. TACACS
B. Diameter
What is the most common and inexpensive form of physical access control device? A. Lightning B. Security guard C. Key locks D. Fences
C. Key locks
Which of the following is not a typical type of alarm that can be triggered for physical security? A. Preventive B. Deterrent C. Repellant D. Notification
A. Preventive
What is the most important goal of all security solutions? A. Prevention of disclosure B. Maintaining integrity C. Human safety D. Sustaining availability
C. Human safety
What is the ideal humidity range for a computer room? A. 20-40 percent B. 40-60 percent C. 60-75 percent D. 80-95 percent
B. 40-60 percent
Which of the following is typically not a culprit in causing damage to computer equipment in the event of a fire and a triggered suppression? A. Heat B. Suppression medium C. Smoke D. Light
D. Light
Which cryptographic algorithm forms the basis of the El Gamal cryptosystem? A. RSA B. Diffie-Hellman C. 3DES D. IDEA
B. Diffie-Hellman
If Richard wants to send an encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message? A. Richard's public key B. Richard's private key C. Sue's public key D. Sue's private key
C. Sue’s public key
If a 2,0480bit plaintext message were encrypted with the El Gamal public key cryptosystem, how long would the resulting cipher text message be? A. 1,024 bits B. 2048 bits C. 4,096 bits D. 8,192 bits
C. 4,096 bits
Acme Widgets currently uses a 1,024-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If it wants to maintain the same cryptographic strength, what ECC key length should it use? A. 160 bits B. 512 bits C. 1,024 bits D. 2,048 bits
A. 160 bits
John wants to produce a message digest of a 2, 048-byte message he plans to send to Mary. If he uses the SHA-1 hashing algorithm, what size will the message digest for this particular message be? A. 160 bits B. 512 bits C. 1,024 bits D. 2, 048 bits
A. 160 bits
What is system accreditation?
A. Formal acceptance of a stated system configuration
B. A functional evaluation of the manufacturer’s goals for each hardware and software component to meet integration standards
C. Acceptance of test results that prove the computer system enforces the security policy
D. The process to specify secure communication between machines
A. Formal acceptance of a stated system configuration
What is a closed system?
A. A system designed around final, or closed, standards
B. A system that includes industry standards
C. A proprietary system that uses unpublished protocols
D. Any machine that does not run Windows
C. A proprietary system that uses unpublished protocols
What is a security control?
A. A security component that stores attributes that describe an object
B. A document that lists all data classification types
C. A list of valid access rules
D. A mechanism that limits access to an object
D. A mechanism that limits access to an object
What is a trusted computing base (TCB)?
A. Hists on you network that support secure transmissions
B. The operating system kernel and device drivers
C. The combination of hardware, software, and controls that work together to enforce a security policy
D. The software and controls that certify a security policy
C. The combination of hardware, software, and controls that work together to enforce a security policy
What part of the TCB concept validates access to every resource prior to granting the requested access? A. TCB partition B. Trusted library C. Reference monitor D. Security kernel
C. Reference monitor
Many PC operating systems provide functionality that enables them to support the simultaneous execution of multiple applications on a single-processor systems. What term is used to describe this capability? A. Multiprogramming B. Multithreading C. Multitasking D. Multiprocessing
C. Multitasking
What technology provides an organization with the best control over BYOD equipment? A. Application whitelisting B. Mobile device management C. Removable storage D. Geotagging
B. Mobile device management
Which of the following is true related to a subject?
A. A subject is always a user account.
B. The subject is always the entity that provides or hosts the information or data.
C. The subject is always the entity that receives information about or data from an object.
D. A single entity can never change roles between subject and object.
C. The subject is always the entity that receives information about or data from an object.
Which of the following types of access control uses fences, security policies, security awareness training, and antivirus software to stop an unwanted or unauthorized activity from occurring? A. Preventive B. Detective. C. Corrective D. Authoritative
A. Preventive