Test Prep Questions Flashcards
Which one of the following is not one of the canons of the (ISC)2 code of ethics?
- Protect society, the common good, necessary public trust and confidence, and the infrastructure.
- Avoid any activity that may be perceived as malicious.
- Act honorably, honestly, justly, responsibly, and legally.
- Advance and protect the profession.
Avoid any activity that may be perceived as malicious.
What security control provides non-repudiation for messages?
- digital certificates
- hash values
- symmetric encryption
- digital signatures
digital signatures
Which one of the following is an example of multifactor authentication?
- password and security questions
- retinal scan and fingerprint
- ID card and PIN
- ID card and key
ID card and PIN
What law regulates the protection of health information?
- FERPA
- PCI DSS
- GLBA
- HIPAA
HIPAA
What security tool can be configured to prevent DDoS attacks?
- switch
- firewall
- endpoint detection and response platform
- intrusion detection system
firewall
Your organization requires that passwords contain a mixture of uppercase characters, lowercase characters, digits, and symbols. What type of password policy is this?
- complexity
- length
- history
- reuse
complexity
During what phase of the access control process does a user prove his or her identity?
- authentication
- authorization
- identification
- remediation
authentication
In what type of attack does the attacker capture and then reuse login information?
- man-in-the-middle attack
- Smurf attack
- DDoS attack
- replay attack
replay attack
What is the best defense against dumpster diving attacks?
- anti-malware software
- clean desk policy
- data loss prevention tools
- shredding
shredding
Purchasing an insurance policy is an example of which risk management strategy?
- risk acceptance
- risk deterrence
- risk transference
- risk mitigation
risk transference
What two factors are used to evaluate a risk?
1. likelihood and impact
2. criticality and likelihood
3. impact and criticality
4. frequency and likelihood
likelihood and impact
What term best describes making a snapshot of a system or application at a point in time for later comparison?
- baselining
- documenting
- diagramming
- versioning
baselining
What type of security control is designed to stop a security issue from occurring in the first place?
- recovery
- administrative
- preventive
- detective
preventive
What term describes risks that originate inside the organization?
- external
- intranet
- internal
- extranet
internal