Thursday, May 5, 2011

CSO Quiz 2 Network Security Plus Questions and Answers

____ is a block cipher that processes blocks of 64 bits.
a. SHA-1 b. RC4 c. RC2 d. MD5

RC2
____ encryption uses two keys instead of one. These keys are mathematically related and are known as the public key and the private key.
a. Asymmetric b. Symmetric c. Private d. Open

Asymmetric
A similar program known as ____ is a PGP open-source product.
a. FreePGP b. GPG c. PGPx d. PGPnix

GPG
Microsoft’s ____ is a cryptography system for Windows operating systems that use the Windows NTFS file system.
a. GPG b. AES c. PGP d. EFS

AES
To protect data stored on a hard drive, Microsoft Windows Vista includes ____ drive encryption.
a. IDEA b. TPM c. BitLocker d. AES

BitLocker
____ digital certificates are often issued from a Web server to a client, although they can be distributed by any type of server, such as a mail server.
a. Software publisher b. Server c. Personal d. Organizational

Personal
In one type of trust model, ____ trust, a relationship exists between two individuals because one person knows the other person.
a. indirect b. third-party c. discrete d. direct

direct
The ____ trust model assigns a single hierarchy with one master CA called the root.
a. web of b. hierarchical c. direct d. third-party

hierarchical
The TLS ____ Protocol allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted.
a. Handshake b. Record c. Transport d. Packing

Handshake
is actually a suite of three utilities—slogin, scp, and ssh—that are secure versions of the unsecure UNIX counterpart utilities rlogin, rcp, and rsh.
a. SSH b. TLS c. SSL d. SFTP

SSH
One variation of PPP that is used by broadband Internet providers with DSL or cable modem connections is ____.

a. TLS b. LCP c. PPPoE d. PPTP
____ fire suppression systems do not harm people, documents, or electrical equipment in the room.

a. Water sprinkler b. Clean sprinkler c. Clean agent d. Dry chemical
RAID Level 5 distributes ____ data (a type of error checking) across all drives instead of using a separate drive to hold the parity error checking information.

a. mirroring b. stripping c. segmenting d. parity
A ____ site is generally run by a commercial disaster recovery service that allows a business to continue computer and network operations to maintain business continuity.

a. hot b. warm c. cold d. cool
The ____ is simply the length of time it will take to recover the data that has been backed up.

a. D2D2T b. RPO c. RTO d. D2D
A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.

a. recommendation b. guideline c. standard d. policy
____ determines the items that have a positive economic value and may include data, hardware, personnel, physical assets, and software.

a. Risk assessment b. Threat identification c. Asset identification d. Vulnerability appraisal
____ takes a snapshot of the security of the organization as it now stands.

a. Risk mitigation b. Vulnerability appraisal c. Risk assessment d. Threat identification
A(n) ____ policy defines requirements for storing and retrieving database usernames and passwords.

a. analog line b. dial-in access c. email retention d. database credentials coding
A(n) ____ policy helps employees determine what information sent or received by email should be retained and for how long.

a. email retention b. extranet c. router security d. information sensitivity
A ____ policy is designed to produce a standardized framework for classifying information assets.

a. classification of information b. change management c. service level agreement d. disposal and destruction
23. ____ refers to a methodology for making changes and keeping track of those changes, often manually.

a. Classification of information b. Change management c. Destruction and disposal d. Service level agreement
____ are values that are attributed to a system of beliefs that help the individual distinguish right from wrong.

a. Ethics b. Morals c. Codes d. Norms
____ relies on tricking and deceiving someone to provide secure information.

a. A worm b. A virus c. A Trojan horse d. Social engineering

No comments:

Post a Comment