____ is a block cipher that processes blocks of 64 bits. 
a. SHA-1 b. RC4 c. RC2 d. MD5  
RC2 
____ encryption uses two keys instead of one. These keys are mathematically related and are known as the public key and the private key. 
a. Asymmetric b. Symmetric c. Private d. Open  
Asymmetric 
A similar program known as ____ is a PGP open-source product. 
a. FreePGP b. GPG c. PGPx d. PGPnix 
GPG 
Microsoft’s ____ is a cryptography system for Windows operating systems that use the Windows NTFS file system.
a. GPG b. AES c. PGP d. EFS   
AES 
To protect data stored on a hard drive, Microsoft Windows Vista includes ____ drive encryption. 
a. IDEA b. TPM c. BitLocker d. AES  
BitLocker 
____ digital certificates are often issued from a Web server to a client, although they can be distributed by any type of server, such as a mail server. 
a. Software publisher b. Server c. Personal d. Organizational  
 Personal 
In one type of trust model, ____ trust, a relationship exists between two individuals because one person knows the other person. 
a. indirect b. third-party c. discrete d. direct  
direct 
The ____ trust model assigns a single hierarchy with one master CA called the root. 
a. web of b. hierarchical c. direct d. third-party  
hierarchical 
The TLS ____ Protocol allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted. 
a. Handshake b. Record c. Transport d. Packing  
Handshake 
is actually a suite of three utilities—slogin, scp, and ssh—that are secure versions of the unsecure UNIX counterpart utilities rlogin, rcp, and rsh. 
a. SSH b. TLS c. SSL d. SFTP  
SSH
One variation of PPP that is used by broadband Internet providers with DSL or cable modem connections is ____.  
a. TLS b. LCP c. PPPoE d. PPTP 
____ fire suppression systems do not harm people, documents, or electrical equipment in the room.  
a. Water sprinkler b. Clean sprinkler c. Clean agent d. Dry chemical 
RAID Level 5 distributes ____ data (a type of error checking) across all drives instead of using a separate drive to hold the parity error checking information.  
a. mirroring b. stripping c. segmenting d. parity 
A ____ site is generally run by a commercial disaster recovery service that allows a business to continue computer and network operations to maintain business continuity.  
a. hot b. warm c. cold d. cool 
The ____ is simply the length of time it will take to recover the data that has been backed up.  
a. D2D2T b. RPO c. RTO d. D2D 
A ____ is a collection of requirements specific to the system or procedure that must be met by everyone. 
a. recommendation b. guideline c. standard d. policy 
____ determines the items that have a positive economic value and may include data, hardware, personnel, physical assets, and software.  
a. Risk assessment b. Threat identification c. Asset identification d. Vulnerability appraisal 
____ takes a snapshot of the security of the organization as it now stands.  
a. Risk mitigation b. Vulnerability appraisal c. Risk assessment d. Threat identification 
A(n) ____ policy defines requirements for storing and retrieving database usernames and passwords.  
a. analog line b. dial-in access c. email retention d. database credentials coding
A(n) ____ policy helps employees determine what information sent or received by email should be retained and for how long. 
a. email retention b. extranet c. router security d. information sensitivity 
A ____ policy is designed to produce a standardized framework for classifying information assets. 
a. classification of information b. change management c. service level agreement d. disposal and destruction 
23. ____ refers to a methodology for making changes and keeping track of those changes, often manually.  
a. Classification of information b. Change management c. Destruction and disposal d. Service level agreement 
____ are values that are attributed to a system of beliefs that help the individual distinguish right from wrong.  
a. Ethics b. Morals c. Codes d. Norms 
____ relies on tricking and deceiving someone to provide secure information.  
a. A worm b. A virus c. A Trojan horse d. Social engineering 
No comments:
Post a Comment