Quiz Midterm Test
Quiz Midterm Test
Question 1
Quiz navigation
If a programmer is restricted from updating and modifying production code, what is this an example of?
Not yet
1 2 3 4 5 6 7 8
answered
a. Rotation of duties
Marked out of
1.00 b. Separation of duties
9 10 11 12 13 14 15 16
Flag c. Controlling input values
question
d. Due diligence 17 18 19 20 21 22 23 24
Clear my choice
25 26 27 28 29 30
Question 3 What is the di erence between least privilege and need to know?
Not yet
answered
a. A user should have least privilege that restricts her need to know.
Marked out of
1.00 b. A user should have a need to know to access particular resources, and least privilege should be implemented to ensure she
only accesses the resources she has a need to know.
Flag
question c. They are two di erent terms for the same issue.
d. A user should have a security clearance to access resources, a need to know about those resources, and least privilege to give
her full control of all resources.
Clear my choice
Question 4 Which best describes a hot-site facility versus a warm- or cold-site facility?
Not yet
answered
a. A site that has disk drives, controllers, and tape drives
Marked out of
1.00 b. A site that has wiring, central air-conditioning, and raised ooring
Flag c. A mobile site that can be brought to the company’s parking lot
question
d. A site that has all necessary PCs, servers, and telecommunications
Clear my choice
Question 6 Pertaining to the CEO’s security concerns, what should Lenny suggest the company put into place?
Not yet
answered
a. An intrusion prevention system, security event management software, and malware protection
Marked out of
1.00 b. Security information and event management software, an intrusion detection system, and signature-based protection
Flag c. An intrusion prevention system, security event management software, and war-dialing protection
question
d. Security event management software, an intrusion prevention system, and behavior-based intrusion detection
Clear my choice
Question 7 What is the technology that allows a user to remember just one password?
Not yet
answered
a. Password dictionaries
Marked out of
1.00 b. Password synchronization
Flag c. Password generation
question
d. Password rainbow tables
Clear my choice
Question 8 Which could be considered a single point of failure within a single sign-on implementation?
Not yet
answered
a. RADIUS
Marked out of
1.00 b. User’s workstation
Flag c. Logon credentials
question
d. Authentication server
Clear my choice
Question 10 Which of the following best describes the type of environment Harry’s team needs to set up?
Not yet
answered
a. Public key infrastructure
Marked out of
1.00 b. Web services
Flag c. Service-oriented architecture
question
d. RADIUS
Clear my choice
Question 11 Which of the following best describes the types of languages and/or protocols that Harry needs to ensure are implemented?
Not yet
answered
a. Security Assertion Markup Language, Extensible Access Control Markup Language, Service Provisioning Markup Language
Marked out of
1.00 b. Extensible Access Control Markup Language, Security Assertion Markup Language, Simple Object Access Protocol
Flag c. Service Provisioning Markup Language, Simple Object Access Protocol, Extensible Access Control Markup Language
question
d. Service Provisioning Markup Language, Security Association Markup Language
Clear my choice
Question 12 Alice wants to send a message to Bob, who is several network hops away from her. What is the best approach to protecting the
Not yet con dentiality of the message?
answered
Question 13 An e ective method to shield networks from unauthenticated DHCP clients is through the use of _______________ on network switches.
Not yet
answered
a. DHCP shielding
Marked out of
1.00 b. DHCP protection
Flag c. DHCP caching
question
d. DHCP snooping
Clear my choice
Question 14 Charlie uses PGP on his Linux-based email client. His friend Dave uses S/MIME on his Windows-based email. Charlie is unable to send
Not yet an encrypted email to Dave. What is the likely reason?
answered
Marked out of a. There is not enough information to determine the likely reason
1.00
b. Each is using a di erent CA
Flag
question c. PGP and S/MIME are incompatible
d. Each has a di erent secret key
Clear my choice
Question 15 What should Don’s team put into place to stop the masquerading attacks that have been taking place?
Not yet
answered
a. Disable unnecessary ICMP tra c at edge routers
Marked out of
1.00 b. ARP spoo ng protection
Flag c. Dynamic packet lter rewall
question
d. SRPC
Clear my choice
Question 16 What type of client ports should Don make sure the institution’s software is using when client-to-server communication needs to take
Not yet place?
answered
Question 17 How many bits make up the e ective length of the DES key?
Not yet
answered
a. 32
Marked out of
1.00 b. 16
Flag c. 56
question
d. 64
Clear my choice
Question 19 smaller number of computers, which still must carry the same processing load as the systems in the main building. Which of the
Not yet following best describes the most important aspects of the products Mark needs to purchase for these purposes?
answered
Marked out of a. Systems must provide multiprogramming multiprocessing capabilities and virtualized environments.
1.00
b. Systems must provide asymmetric multiprocessing capabilities and virtualized environments.
Flag
question c. Systems must provide symmetric multiprocessing capabilities and virtualized environments.
d. Systems must provide multiprogramming multiprocessing capabilities and symmetric multiprocessing environments.
Clear my choice
Question 20 What feature enables code to be executed without the usual security checks?
Not yet
answered
a. Maintenance hook
Marked out of
1.00 b. Temporal isolation
Flag c. Maintenance disk
question
d. Race conditions
Clear my choice
Question 22 During which phase or phases of the information life cycle can cryptography be an e ective control?
Not yet
answered
a. Disposal and Use
Marked out of
1.00 b. All the them.
Flag c. Archival and Disposal
question
d. Use and Archival
Clear my choice
Question 23 Information classi cation is most closely related to which of the following?
Not yet
answered
a. The information’s destination
Marked out of
1.00 b. The information’s age
Flag c. None of them
question
d. The source of the information
Clear my choice
Question 24 What should management consider the most when classifying data?
Not yet
answered
a. The type of employees, contractors, and customers who will be accessing the data
Marked out of
1.00 b. Availability, integrity, and con dentiality
Flag c. Assessing the risk level and disabling countermeasures
question
d. Availability, integrity
Clear my choice
Question 25 Which of the following makes the most sense for a single organization’s classi cation levels for data?
Not yet
answered
a. Sensitive, Sensitive But Unclassi ed (SBU), Proprietary
Marked out of
1.00 b. Proprietary, Trade Secret, Private
Flag c. Unclassi ed, Secret, Top Secret
question
d. Unclassi ed, Sensitive, Top Secret
Clear my choice
Question 26 Which of the following requirements should the data retention policy address?
Not yet
answered
a. Operational
Marked out of
1.00 b. Legal
Flag c. All the them
question
d. Regulatory
Clear my choice
Question 28 If di erent user groups with di erent security access levels need to access the same information, which of the following actions should
Not yet management take?
answered
Question 29 The data owner is most often described by all of the following except
Not yet
answered
a. Financially liable for the receive of the data
Marked out of
1.00 b. Manager in charge of a business unit
Flag c. Ultimately responsible for the protection of the data
question
d. Financially liable for the loss of the data
Clear my choice
Question 30 OCTAVE, NIST SP 800-30, and AS/NZS 4360 are di erent approaches to carrying out risk management within companies and
Not yet organizations. What are the di erences between these methods?
answered
Marked out of a. AS/NZS is IT based, and OCTAVE and NIST SP 800-30 are assurance based.
1.00
b. NIST SP 800-30 and AS/NZS are corporate based, while OCTAVE is international.
Flag
question c. NIST SP 800-30 is IT based, while OCTAVE and AS/NZS 4360 are
d. None of them.
Clear my choice
PREVIOUS ACTIVITY
Lect01_2-Discuss-Six-Ps
Jump to...
Contact: [email protected]