Tuesday, January 14, 2014

CIS 481-20: INTRO TO INFORM SECURITY EXAM 2

  • Question 1

    2 out of 2 points
    The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.
    Selected Answer:
    Correct 
    RSA
    Correct Answer:
    Correct RSA
  • Question 2

    2 out of 2 points
    ____ controls are management and lower-level planning functions that deal with issues such as disaster recovery and incident response planning, personnel security, physical security, and the protection of production inputs and outputs.
    Selected Answer:
    Correct 
    Operational
    Correct Answer:
    Correct Operational
  • Question 3

    1 out of 1 points
    Best practices in firewall rule set configuration state that the firewall device is never accessible directly from the public network for configuration or management purposes.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 4

    1 out of 1 points
    Intrusion detection consists of procedures and systems that identify system intrusions and take automatic corrective action when an intrusion is detected.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 5

    1 out of 1 points
    Cryptography is the art and science of hiding information inside other, seemingly ordinary messages or documents.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 6

    2 out of 2 points
    ____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.
    Selected Answer:
    Correct 
    Fuzz
    Correct Answer:
    Correct Fuzz
  • Question 7

    1 out of 1 points
    The Advanced Encryption Standard (AES) is an example of an asymmetric encryption system.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 8

    2 out of 2 points
    Activities that scan network locales for active systems and then identify the network services offered by the host systems is known as ____.
    Selected Answer:
    Correct 
    fingerprinting
    Correct Answer:
    Correct fingerprinting
  • Question 9

    1 out of 1 points
    Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 10

    1 out of 1 points
    The Vigenere cipher is an example of a polyalphabetic substitution cipher.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 11

    2 out of 2 points
    ____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
    Selected Answer:
    Correct 
    Packet-filtering
    Correct Answer:
    Correct Packet-filtering
  • Question 12

    1 out of 1 points
    Compared to symmetric encryption, asymmetric encryption is generally not as efficient in terms of CPU computations.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 13

    2 out of 2 points
    The dominant architecture used to secure network access today is the ____ firewall.
    Selected Answer:
    Correct 
    screened subnet
    Correct Answer:
    Correct screened subnet
  • Question 14

    2 out of 2 points
    ____ inspection firewalls keep track of each network connection between internal and external systems.
    Selected Answer:
    Correct 
    Stateful
    Correct Answer:
    Correct Stateful
  • Question 15

    1 out of 1 points
    The crossover error rate is the level at which the number of false rejections equals the false acceptances.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 16

    2 out of 2 points
    ____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.
    Selected Answer:
    Correct 
    PKI
    Correct Answer:
    Correct PKI
  • Question 17

    1 out of 1 points
    A recent attack method called sunshine cracking uses a database of precomputed hashes from sequentially calculated passwords. The sunshine cracker simply looks up the hashed password and reads out the text version of the password, no brute force required.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 18

    2 out of 2 points
    ____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.
    Selected Answer:
    Correct 
    PGP
    Correct Answer:
    Correct PGP
  • Question 19

    1 out of 1 points
    The application firewall runs special software that acts as a proxy for a service request.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 20

    1 out of 1 points
    Wired Equivalent Privacy (WEP) was an early attempt to provide security with the 802.11 wireless network protocol but is now considered too cryptographically weak to provide any meaningful protection from eavesdropping.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 21

    2 out of 2 points
    ____ controls set the direction and scope of the security process, and provide detailed instructions for its conduct, as well as addressing the design and implementation of the security planning process.
    Selected Answer:
    Correct 
    Managerial
    Correct Answer:
    Correct Managerial
  • Question 22

    1 out of 1 points
    A warm site provides many of the same services and options of a hot site, though typically without configured applications.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 23

    2 out of 2 points
    ____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.
    Selected Answer:
    Correct 
    Key
    Correct Answer:
    Correct Key
  • Question 24

    2 out of 2 points
    ____ are encrypted messages that can be mathematically proven to be authentic.
    Selected Answer:
    Correct 
    Digital signatures
    Correct Answer:
    Correct Digital signatures
  • Question 25

    2 out of 2 points
    ____ controls are the tactical implementations of security in the organization and include logical access controls, such as authentication, authorization, and cryptography.
    Selected Answer:
    Correct 
    Technical
    Correct Answer:
    Correct Technical
  • Question 26

    1 out of 1 points
    Host-based IDSs are usually installed on the machines they protect to monitor the status of various files stored on those machines.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 27

    1 out of 1 points
    Hash algorithms are publicly known functions that create a value by converting variable-length messages into a single fixed-length value.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True

No comments:

Post a Comment