Test Prep Questions Flashcards

1
Q

Which one of the following is not one of the canons of the (ISC)2 code of ethics?

  1. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  2. Avoid any activity that may be perceived as malicious.
  3. Act honorably, honestly, justly, responsibly, and legally.
  4. Advance and protect the profession.
A

Avoid any activity that may be perceived as malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What security control provides non-repudiation for messages?

  1. digital certificates
  2. hash values
  3. symmetric encryption
  4. digital signatures
A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which one of the following is an example of multifactor authentication?

  1. password and security questions
  2. retinal scan and fingerprint
  3. ID card and PIN
  4. ID card and key
A

ID card and PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What law regulates the protection of health information?

  1. FERPA
  2. PCI DSS
  3. GLBA
  4. HIPAA
A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What security tool can be configured to prevent DDoS attacks?

  1. switch
  2. firewall
  3. endpoint detection and response platform
  4. intrusion detection system
A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your organization requires that passwords contain a mixture of uppercase characters, lowercase characters, digits, and symbols. What type of password policy is this?

  1. complexity
  2. length
  3. history
  4. reuse
A

complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During what phase of the access control process does a user prove his or her identity?

  1. authentication
  2. authorization
  3. identification
  4. remediation
A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In what type of attack does the attacker capture and then reuse login information?

  1. man-in-the-middle attack
  2. Smurf attack
  3. DDoS attack
  4. replay attack
A

replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best defense against dumpster diving attacks?

  1. anti-malware software
  2. clean desk policy
  3. data loss prevention tools
  4. shredding
A

shredding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purchasing an insurance policy is an example of which risk management strategy?

  1. risk acceptance
  2. risk deterrence
  3. risk transference
  4. risk mitigation
A

risk transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What two factors are used to evaluate a risk?
1. likelihood and impact
2. criticality and likelihood
3. impact and criticality
4. frequency and likelihood

A

likelihood and impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What term best describes making a snapshot of a system or application at a point in time for later comparison?

  1. baselining
  2. documenting
  3. diagramming
  4. versioning
A

baselining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of security control is designed to stop a security issue from occurring in the first place?

  1. recovery
  2. administrative
  3. preventive
  4. detective
A

preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What term describes risks that originate inside the organization?

  1. external
  2. intranet
  3. internal
  4. extranet
A

internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly