CISSP Exercise
CISSP Exercise
Answer: D
Policies are considered the first and highest level of documentation, from which the
lower level elements of standards, procedures, and guidelines flow. This order,
however, does not mean that policies are more important than the lower elements.
2. Which one of the following is an important characteristic of an information security
policy?
Answer: A
Information security policies area high-level plans that describe the goals of the
procedures. Policies are not guidelines or standards, nor are they procedures or
controls. Policies describe security in general terms, not specifics.
3. Which of the following would be the first step in establishing an information
security program?
Answer: A
4. What is the function of a corporate information security policy?
C. Define the specific assets to be protected and identify the specific tasks which
must be completed to securethem.
D. Define the main security objectives which must be achieved and the security
framework to meet business objectives.
Answer: D
Information security policies are high-level plans that describe the goals of the
procedures or controls. Policies describe security in general, not specifics.
5. Why must senior management endorse a security policy?
A. So that they will accept ownership for security within the organization.
Answer: A
Answer: B
7. Which one of the following should NOT be contained within a computer policy?
Answer: B
8. Which one of the following statements describes management controls that are
instituted to implement a security policy?
Answer: C
9. Which must bear the primary responsibility for determining the level of protection
needed for information systems resources?
Answer: B
10. Which of the following choices is NOT part of a security policy?
A.) definition of overall steps of information security and the importance of security
Answer: D
11. Which of the following embodies all the detailed actions that personnel are
required to follow?
A.) Standards
B.) Guidelines
C.) Procedures
D.) Baselines
Answer: C
12 Security is a process that is:
A. Continuous
B. Indicative
C. Examined
D. Abnormal
Answer: A
13 What are the three fundamental principles of security?
Answer: B
14. Making sure that the data is accessible when and where it is needed is which of
the following?
A.) Confidentiality
B.) integrity
C.) acceptability
D.) availability
Answer: D
15 Most computer attacks result in violation of which of the following security
properties?
A. Availability
B. Confidentiality
Answer: D
16. An area of the Telecommunications and Network Security domain that directly
affects the Information Systems Security tenet of Availability can be defined as:
Answer: B
17. Which one of the following is the MOST crucial link in the computer security
chain?
A. Access controls
B. People
C. Management
D. Awareness programs
Answer: C
18. Information security is the protection of data. Information will be protected
mainly based on:
B. Its confidentiality.
C. Its value.
Answer: D
19. Organizations develop change control procedures to ensure that
Answer: A
20. Which one of the following is the MAIN goal of a security awareness program
when addressing senior management?
Answer: B
21. In developing a security awareness program, it is MOST important to
Answer: A
22. Which of the following would be best suited to provide information during a
review of the controls over the process of defining IT service levels?
D.) Programmer
Answer: C
23. Risk analysis is MOST useful when applied during which phase of the system
development process?
Answer: A
24. Which of the following is not a part of risk analysis?
C.) Provide an economic balance between the impact of the risk and the cost of the
associated countermeasures
Answer: D
25. How should a risk be handled when the cost of the countermeasures outweighs
the cost of the risk?
Answer: C
26. Which one of the following is the PRIMARY objective of penetration testing?
A. Assessment
B. Correction
C. Detection
D. Protection
Answer: C
27. Penetration testing will typically include
Answer: C
28. Annualized Loss Expectancy (ALE) value is derived from an algorithm of the
product of annual rate of occurrence and
Answer: D
29. How is Annualized Loss Expectancy (ALE) derived from a threat?
C.) SLE/EF
D.) AV x EF
Answer: B
30. Which risk management methodology uses the exposure factor multiplied by the
asset value to determine its outcome?
Answer: B
31. Valuable paper insurance coverage does not cover damage to which of the
following?
B.) Manuscripts
C.) Records
Answer: D
32. What is the Maximum Tolerable Downtime (MTD):
C.) Maximum elapsed time required to move back to primary site a major disruption
D.) It is maximum delay businesses that can tolerate and still remain viable
Answer: D
33. Who should determine the appropriate access control of information?
A. Owner
B. User
C. Administrator
D. Server
Answer: A
34. What is the main responsibility of the information owner?
A.) making the determination to decide what level of classification the information
requires
C.) audit the users when they require access to the information
D.) periodically checking the validity and accuracy for all data in the information
system
Answer: A
35. What principle requires that a user be given no more privilege then necessary to
perform a job?
Answer: D
36. Cryptography does not concern itself with:
A.) Availability
B.) Integrity
C.) Confidentiality
D.) Authenticity
Answer: A
37. Which of the following measures would be the BEST deterrent to the theft of
corporate information from a laptop which was left in a hotel room?
A.) Store all data on disks and lock them in an in-room safe
B.) Remove the batteries and power supply from the laptop and store them separately
from the computer
Answer: D
38. To support legacy applications that rely on risky protocols (e.g, plain text
passwords), which one of the following can be implemented to mitigate the risks on a
corporate network?
C. Ensure that only authorized trained users have access to workstations through
physical access control.
D. Ensure audit logging is enabled on all hosts and applications with associated
frequent log reviews.
Answer: B
39. The technique of skimming small amounts of money from multiple transactions is
called the
A. Scavenger technique
B. Salami technique
D. Leakage technique
Answer: B
40. Which security program exists if a user accessing low-level data is able to draw
conclusions about high-level information?
A. Interference
B. Inference
C. Polyinstatiation
D. Under-classification
Answer: B
41.Data inference violations can be reduced using
A. Polyinstantiation technique.
D. Correct-state transformation.
Answer: A
A.) Multiprocessing
B.) Multitasking
C.) Multithreading
Answer: A
43. Which of the following statements pertaining to the security kernel is incorrect?
A.) It is made up of mechanisms that fall under the TCB and implements and
enforces the reference monitor concept.
B.) It must provide isolation for the processes carrying out the reference monitor
concept and they must be tamperproof
C.) It must be small enough to be able to be tested and verified in a complete and
comprehensive manner
Answer: D
44. The concept that all accesses must be meditated, protected from modification, and
verifiable as correct is the concept of
A. Secure model
B. Security locking
C. Security kernel
D. Secure state
Answer: C
Answer: A
46. What are the assurance designators used in the Common Criteria (CC)?
Answer: A
47. Which of the following uses protection profiles and security targets?
A.) ITSEC
B.) TCSEC
C.) CTCPEC
Answer: D
48. The Common Criteria construct which allows prospective consumers or
developers to create standardized sets of security requirements to meet there needs is
Answer: A
49. Which Orange Book evaluation level is described as "Verified Design"?
A.) A1
B.) B3
C.) B2
D.) B1
Answer: A
Answer: C
51. The Clark Wilson model has its emphasis on:
A. Security
B. Integrity
C. Accountability
D. Confidentiality
Answer: B
52. What does * (star) integrity axiom mean in the Biba model?
A.) No read up
D.) No write up
Answer: D
53. Which access control model states that for integrity to be maintained data must
not flow from a receptacle of given integrity to a receptacle of higher integrity?
A. Lattice Model
B. Bell-LaPadula Model
C. Biba Model
D. Take-Grant Model
Answer: C
54. Related to information security, confidentiality is the opposite of which of the
following?
A.) closure
B.) disclosure
C.) disposal
D.) disaster
Answer: B
55. What is the main concern of the Bell-LaPadula security model?
A.) Accountability
B.) Integrity
C.) Confidentiality
D.) Availability
Answer: C
56. Which of the following is a state machine model capturing confidentiality aspects
of access control?
A. Clarke Wilson
B. Bell-LaPadula
C. Chinese Wall
D. Lattice
Answer: B
57. With the BLP model, security policies prevent information flowing downwards
from a:
Answer: B
Answer: C
59. Access control techniques do not include:
Answer: D
60. The default level of security established for access controls should be
A. All access
B. Update access
C. Read access
D. No access
Answer: D
61. Which of the following is a type of mandatory access control?
Answer: A
62. Which of the following is a means of restricting access to objects based on the
identity of the subject to which they belong?
Answer: C
63. Which of the following is true about MAC?
Answer: B
64. A firewall can be classified as a:
Answer: B
65. What is one issue NOT addressed by the Bell-LaPadula model?
B. Security levels
C. Covert channels
D. Access modes
Answer: C
66. The access matrix model has which of the following common implementations?
C. Capabilities.
Answer: A
66. A channel within a computer system or network that is designed for the
authorized transfer of information is identified as a(n)?
Answer: B
68. Covert channel is a communication channel that can be used for:
Answer: B
69. What is an indirect way to transmit information with no explicit reading of
confidential information?
A. Covert channels
B. Backdoor
C. Timing channels
D. Overt channels
Answer: A
70. What is the essential difference between a self-audit and an independent audit?
B.) Results
C.) Objectivity
D.) Competence
Answer: C
71. What is called the formal acceptance of the adequacy of a system's overall
security by the management?
A.) Certification
B.) Acceptance
C.) Accreditation
D.) Evaluation
Answer: C
72. Which of the following will you consider as the MOST secure way of
authentication?
A. Biometric
B. Password
C. Token
D. Ticket Granting
Answer: A
73. In biometric identification systems, at the beginning, it was soon apparent that
truly positive identification could only be based on physical attributes of a person.
This raise the necessarily of answering 2 questions:
B.) what part of the body to be used and how to accomplish identification to be viable
C.) what was the age of a person and his income level
D.) what was the tone of the voice of a person and his habits
Answer: B
74. What is called the percentage of invalid subjects that are falsely accepted?
Answer: B
75. Which one of the following is the MOST critical characteristic of a biometrics
system?
A. Acceptability
B. Accuracy
C. Throughput
D. Reliability
Answer: B
76. Biometric performance is most commonly measured in terms of:
Answer: A
77. Which of the following biometric characteristics cannot be used to uniquely
authenticate an individual's identity?
Answer: D
78. You are comparing biometric systems. Security is the top priority. A low
________ is most important in this regard.
A. FAR
B. FRR
C. MTBF
D. ERR
Answer: A
79. Almost all types of detection permit a system's sensitivity to be increased or
decreased during an inspection process. To have a valid measure of the system
performance:
Answer: A
80. Which of the following are the types of eye scan in use today?
Answer: B
81. In addition to the accuracy of the biometric systems, there are other factors that
must also be considered:
A.) These factors include the enrollment time and the throughput rate, but not
acceptability.
B.) These factors do not include the enrollment time, the throughput rate, and
acceptability.
C.) These factors include the enrollment time, the throughput rate, and acceptability.
D.) These factors include the enrollment time, but not the throughput rate, neither the
acceptability.
Answer: C
82. What physical characteristics does a retinal scan biometric device measure?
Answer: D
83. Type II errors occur when which of the following biometric system rates is high?
Answer: A
84. In the world of keystroke dynamics, what represents the amount of time you hold
down in a particular key?
A. Dwell time
B. Flight time
C. Dynamic time
D. Systems time
Answer: A
A. Dynamic time
B. Flight time
C. Dwell time
D. Systems time.
Answer: B
86. Signature identification systems analyze what areas of an individual's signature?
Answer: A
87. What is known as the probability that you are not authenticated to access your
account?
A. ERR
B. FRR
C. MTBF
D. FAR
Answer: B
88. Which of the following is true of two-factor authentication?
A.) It uses the RSA public-key signature based algorithm on integers with large prime
factors
Answer: D
89. Which of the following is true about Kerberos?
B.) It encrypts data after a ticket is granted, but passwords are exchanged in plain text
Answer: C
90. The primary service provided by Kerberos is which of the following?
A.) non-repudiation
B.) confidentiality
C.) authentication
D.) authorization
Answer: C
91. Which of the following is a trusted, third party authentication protocol that was
developed under Project Athena at MIT?
A.) Kerberos
B.) SESAME
C.) KryptoKnight
D.) NetSP
Answer: A
92. A confidential number to verify a user's identity is called a:
A.) PIN
B.) userid
C.) password
D.) challenge
Answer: A
93. How are memory cards and smart cards different?
A.) Memory cards normally hold more memory than smart cards
B.) Smart cards provide a two-factor authentication whereas memory cards don't
Answer: C
94. They in form of credit card-size memory cards or smart cards, or those resembling
small calculators, are used to supply static and dynamic passwords are called:
A.) Tickets
B.) Tokens
D.) Coupons
Answer: B
95. Memory only cards work based on:
Answer: D
96. Processor card contains which of the following components?
Answer: C
97. Which of the following offers advantages such as the ability to use stronger
passwords, easier password administration, and faster resource access?
C.) Kerberos
Answer: B
98. What is the main concern with single sign-on?
Answer: A
99. Which of the following addresses cumbersome situations where users need to log
on multiple times to access different resources?
Answer: A
100. Which of the following correctly describe the features of SSO?
Answer: A
101. In a RADIUS architecture, which of the following acts as a client?
Answer: A
102. Which of the following is the weakest authentication mechanism?
A.) Passphrases
B.) Passwords
Answer: B
103. Software generated passwords have what drawbacks?
Answer: A
104. Which of the following will you consider as most secure?
A. Password
C. Login phrase
D. Login ID
Answer: B
105. Which of the following are the correct guidelines of password deployment?
Answer: D
106. Why would a 16 characters password not desirable?
A. Hard to remember
Answer: A
107. Which of the following is NOT a good password deployment guideline?
Answer: C
108. What should you do immediately if the root password is compromised?
Answer: B
All passwords must be changed if the root password is compromised or disclosure is
suspected.
109. Which of the following is the most secure way to distribute password?
Answer: B
110. Which of the following does not apply to system-generated passwords?
C.) Passwords are more vulnerable to brute force and dictionary attacks.
Answer: C
111. Passwords can be required to change monthly, quarterly, or any other intervals:
B.) depending on the criticality of the information needing protection and the
password's frequency of use
D.) not depending on the criticality of the information needing protection but
depending on the password's frequency of use
Answer: B
112. Identification usually takes the form of:
A. Login ID.
B. User password.
D. Passphrase
Answer: A
113. What is called the act of a user professing an identity to a system, usually in the
form of a log-on ID?
A.) Authentication
B.) Identification
C.) Integrity
D.) Confidentiality
Answer: B
114. What is called the verification that the user's claimed identity is valid and is
usually implemented through a user password at log-on time?
A.) Authentication
B.) Identification
C.) Integrity
D.) Confidentiality
Answer: A
115. Authentication is typically based upon:
Answer: D
Answer: B
117. A smart card represents:
Answer: C
118. Retinal scans check for:
Answer: A
119. What type of authentication takes advantage of an individuals unique physical
characteristics in order to authenticate that persons identity?
A. Password
B. Token
C. Ticket Granting
D. Biometric
Answer: D
120. What is called an automated means of identifying or authenticating the identity
of a living person based on physiological or behavioral characteristics?
A.) Biometrics
B.) Micrometrics
C.) Macrometrics
D.) MicroBiometrics
Answer: A
121. Which of the following forms of authentication would most likely apply a digital
signature algorithm to every bit of data that is sent from the claimant to the verifier?
Answer: C
122. In which situation would TEMPEST risks and technologies be of MOST
interest?
Answer: B
123. Which one of the following addresses the protection of computers and
components from electromagnetic emissions?
A. TEMPEST
B. ISO 9000
C. Hardening
D. IEEE 802.2
Answer: A
124. What name is given to the study and control of signal emanations from electrical
and electromagnetic equipment?
A. EMI
B. Cross Talk
C. EMP
D. TEMPEST
Answer: D
125. TEMPEST addresses
Answer: C
126. Which one of the following is the MOST solid defense against interception of a
network transmission?
A. Frequency hopping
B. Optical fiber
C. Alternate routing
D. Encryption
Answer: B
127. Which of the following media is MOST resistant to tapping?
A.) Microwave
Answer: D
128. Which of the following could illegally capture network user passwords?
B.) Sniffing
C.) Spoofing
D.) Smurfing
Answer: B
129. A system uses a numeric password with 1-4 digits. How many passwords need to
be tried before it is cracked?
A.) 1024
B.) 10000
C.) 100000
D.) 1000000
Answer: B
C. After three unsuccessful attempts to enter a password, the account will be locked.
Answer: C
131. Which of the following is an effective measure against a certain type of brute
force password attack?
Answer: A
132. Which type of attack will most likely provide an attacker with multiple
passwords to authenticate to a system?
Answer: A
133. Which of the following are measures against password sniffing?
Answer: D
134. Which one of the following conditions is NOT necessary for a long dictionary
attack to succeed?
D. The attacker must know the password encryption mechanism and key variable.
Answer: C
The program encrypts the combination of characters and compares them to the
encrypted entries in the password file. If a match is found, the program has uncovered
a password.
135. Which one of the following BEST describes a password cracker?
Answer: C
136. If a token and 4-digit personal identification number (PIN) are used to access a
computer system and the token performs off-line checking for the correct PIN, what
type of attack is possible?
A. Birthday
B. Brute force
C. Man-in-the-middle
D. Smurf
Answer: B
137. Which of the following actions can increase the cost of an exhaustive attack?
Answer: B
138. Which of the following attacks focus on cracking passwords?
A. SMURF
B. Spamming
C. Teardrop
D. Dictionary
Answer: D
139. Which of the following can best eliminate dial-up access through a Remote
Access Server as a hacking vector?
B.) Installing the Remote Access Server outside the firewall and forcing legitimate
users to uthenticate to the firewall.
Answer: B
140. Which of the following attacks could be the most successful when the security
technology is properly implemented and configured?
A. Logical attacks
B. Physical attacks
Answer: C
A. Physical attacks
B. Logical attacks
Answer: A
142. Which one of the following is an example of electronic piggybacking?
Answer: C
143. What attack involves actions to mimic one's identity?
A. Brute force
B. Exhaustive
C. Social engineering
D. Spoofing
Answer: D
144. Which access control model enables the owner of the resource to specify what
subjects can access specific resources?
Answer: A
145. The type of discretionary access control that is based on an individual's identity
is called:
Answer: A
146. Which of the following access control types gives "UPDATE" privileges on
Structured Query Language (SQL) database objects to specific users or groups?
A. Supplemental
B. Discretionary
C. Mandatory
D. System
Answer: C
147. With Discretionary access controls, who determines who has access and what
privilege they have?
A. End users.
C. Resource owners.
Answer: C
148. Under MAC, which of the following is true?
Answer: B
149. With MAC, who may make decisions that bear on policy?
Answer: C
150. With MAC, who may NOT make decisions that derive from policy?
B. The administrator.
D. The guests.
Answer: A
151. Under the MAC control system, what is required?
A. Performance monitoring
B. Labeling
C. Sensing
Answer: B
152. Access controls that are not based on the policy are characterized as:
A. Secret controls
B. Mandatory controls
C. Discretionary controls
D. Corrective controls
Answer: C
153. In a discretionary mode, which of the following entities is authorized to grant
information access to other people?
A.) manager
D.) user
Answer: D
154. Under Role based access control, access rights are grouped by:
A. Policy name
B. Rules
C. Role name
D. Sensitivity label
Answer: C
155. DAC and MAC policies can be effectively replaced by:
Answer: B
Answer: B
157. Which one of the following is a security issue related to aggregation in a
database?
A. Polyinstantiation
B. Inference
C. Partitioning
D. Data swapping
Answer: B
Inference is the ability of users to infer or deduce information about data at sensitivity
levels for which they do not have access privileges.
158. Which of the following defines the software that maintains and provides access
to the database?
Answer: A
159. Which of the following is not a responsibility of a database administrator?
Answer: D
160. SQL commands do not include which of the following?
Answer: D
161. A persistent collection of interrelated data items can be defined as which of the
following?
A.) database
Answer: A
162. Which of the following is the marriage of object-oriented and relational
technologies combining the attributes of both?
Answer: A
163. To ensure integrity, a payroll application program may record transactions in the
appropriate accounting period by using
A. Application checkpoints
Answer: B
164. What ensures that the control mechanisms correctly implement the security
policy for the entire life cycle of an information system?
Answer: C
Assurance procedures ensure that the control mechanisms correctly implement the
security policy for the entire life cycle of an information system.
165. Which of the following is an advantage of using a high-level programming
language?
Answer: A
166. The design phase in a system development life cycle includes all of the following
EXCEPT
Answer: C
167. When considering the IT Development Life-Cycle, security should be:
Answer: C
168. Buffer overflow and boundary condition errors are subsets of:
Answer: D
169. Which of the following would be the most serious risk where a systems
development life cycle methodology is inadequate?
D.) The project will fail to meet business and user needs
Answer: D
170. Which of the following would provide the best stress testing environment?
Answer: B
171. Which of the following functions is less likely to be performed by a typical
security administrator?
Answer: B
172. Who is responsible for setting user clearances to computer-based information?
B.) Operators
Answer: A
173. Which of the following correctly describe "good" security practice?
Answer: D
174. Access to the _________ account on a Unix server must be limited to only the
system administrators that must absolutely have this level of access.
A. Superuser of inetd.
B. Manager or root.
C. Fsf or root
D. Superuser or root.
Answer: D
175. Root login should only be allowed via:
A. Rsh
B. System console
C. Remote program
D. VNC
Answer: B
176. In order to avoid mishandling of media or information, you should consider
using:
A. Labeling
B. Token
C. Ticket
D. SLL
Answer: A
177. In order to avoid mishandling of media or information, which of the following
should be labeled?
A. Printed copies
B. Tape
C. Floppy disks
Answer: A
178. Removing unnecessary processes, segregating inter-process communications,
and reducing executing privileges to increase system security is commonly called
A. Hardening
B. Segmenting
C. Aggregating
D. Kerneling
Answer: A
179. Which one of the following entails immediately transmitting copies of on-line
transactions to a remote computer facility for backup?
B. Electronic vaulting
D. Data compression
Answer: B
180. The alternate processing strategy in a business continuity plan can provide for
required backup computing capacity through a hot site, a cold site, or
Answer: C
Answer: A
182. This backup method makes a complete backup of every file on the server every
time it is run by:
Answer: A
183. A backup of all files that are new or modified since the last full backup is
A. In incremental backup
B. A father/son backup
C. A differential backup
D. A full backup
Answer: C
184. Which one of the following is a good defense against worms?
Answer: B
185. What is the term used to describe a virus that can infect both program files and
boot sectors?
A. Polymorphic
B. Multipartite
C. Stealth
D. Multiple encrypting
Answer: B
186. In what way could Java applets pose a security threat?
A.) Their transport can interrupt the secure distribution of World Wide Web pages
over the internet by removing SSL and S-HTTP
B.) Java interpreters do not provide the ability to limit system access that an applet
could have on a client system
C.) Executables from the Internet may attempt an intentional attack when they are
downloaded on a client system
D.) Java does not check the bytecode at runtime or provide other safety mechanisms
for program isolation from the client system.
Answer: C
187. What setup should an administrator use for regularly testing the strength of user
passwords?
A.) A networked workstation so that the live password database can easily be accessed
by the cracking program
B.) A networked workstation so the password database can easily be copied locally
and processed by the cracking program
C.) A standalone workstation on which the password database is copied and processed
by the cracking program
Answer: C
188. On UNIX systems, passwords shall be kept:
D. In root.
Answer: B
189. Which of the following would constitute the best example of a password to use
for access to a system by a network administrator?
A.) holiday
B.) Christmas12
C.) Jenny&30
D.) TrZc&45g
Answer: D
190. Which of the following refers to the data left on the media after the media has
been erased?
A.) remanence
B.) recovery
D.) semi-hidden
Answer: A
191. What is the main issue with media reuse?
A.) Degaussing
D.) Purging
Answer: B
192. What should a company do first when disposing of personal computers that once
were used to store confidential data?
Answer: C
193. In an on-line transaction processing system, which of the following actions
should be taken when erroneous or invalid transactions are detected?
B.) The transactions should be processed after the program makes adjustments
Answer: C
194. Which of the following is a reasonable response from the intrusion detection
system when it detects Internet Protocol (IP) packets where the IP source address is
the same as the IP destination address?
A. Allow the packet to be processed by the network and record the event.
B. Record selected information about the item and delete the packet.
Answer: B
195. Which of the following is not a good response to a detected intrusion?
B.) Inject TCP reset packets into the attacker's connection to the victim system
C.) Reconfigure routers and firewalls to block packets from the attacker's apparent
connection
D.) Launch attacks or attempt to actively gain information about the attacker's host
Answer: D
196. Which of the following is used to monitor network traffic or to monitor host
audit logs in order to determine violations of security policy that have taken place?
Answer: A
197. Which one of the following is NOT a characteristic of an Intrusion Detection
System? (IDS)
Answer: C
198. An IDS detects an attach using which of the following?
Answer: C
199. Which of the following monitors network traffic in real time?
Answer: A
200. What technology is being used to detect anomalies?
A. IDS
B. FRR
C. Sniffing
D. Capturing
Answer: A
201. IDSs verify, itemize, and characterize threats from:
D. The Internet.
Answer: C
202. The majority of commercial intrusion detection systems are:
A. Identity-based
B. Network-based
C. Host-based
D. Signature-based
Answer: B
203. Which of the following is a drawback of Network-based IDSs?
D. It is not effective.
Answer: A
Answer: A
205. When comparing host based IDS with network based ID, which of the following
is an obvious advantage?
Answer: A
206. Which of the following IDS inflict a higher performance cost on the monitored
systems?
A. Encryption based
B. Host based
C. Network based
D. Trusted based
Answer: B
207. Application-based IDSs normally utilize information from which of the
following sources?
Answer: D
208. Which of the following are the major categories of IDSs response options?
A. Active responses
B. Passive responses
C. Hybrid
Answer: D
209. What are the primary approaches IDS takes to analyze events to detect attacks?
Answer: A
210. Misuse detectors analyze system activity and identify patterns. The patterns
corresponding to know attacks are called:
A. Attachments
B. Signatures
C. Strings
D. Identifications
Answer: B
211. Which of the following would assist in intrusion detection?
Answer: A
212. Using clipping levels refers to:
Answer: A
213. When establishing a violation tracking and analysis process, which one of the
following parameters is used to keep the quantity of data to manageable levels?
A. Quantity baseline
C. Circular logging
D. Clipping levels
Answer: D
214. Audit trails based upon access and identification codes establish...
B. individual accountability
D. individual authentication
Answer: B
215. The primary reason for enabling software audit trails is which of the following?
Answer: C
216. Tracing violations, or attempted violations of system security to the user
responsible is a function of?
A. authentication
B. access management
C. integrity checking
D. accountability
Answer: D
217. Which of the following questions is less likely to help in assessing controls over
audit trails?
D.) Is there separation of duties between security personnel who administer the access
control function and those who administer the audit trail?
Answer: B
218. You should keep audit trail on which of the following items?
A. Password usage.
Answer: C
219. In addition to providing an audit trail required by auditors, logging can be used
to
Answer: B
220. Who should NOT have access to the log files?
A. Security staff.
D. Manager's secretary.
Answer: D
221. Logs must be secured to prevent:
Answer: C
222. To ensure dependable and secure logging, all computers must have their clock
synchronized to:
A. A central timeserver.
Answer: A
223. To ensure dependable and secure logging, logging information traveling on the
network should be:
A. Stored
B. Encrypted
C. Isolated
D. Monitored
Answer: B
224. The activity that consists of collecting information that will be used for
monitoring is called:
A. Logging
B. Troubleshooting
C. Auditing
D. Inspecting
Answer: A
225. How often should logging be run?
B. Always
C. Once a day.
D. During maintenance.
Answer: B
226. Which of the following are potential firewall problems that should be logged?
A. Reboot
B. Proxies restarted.
Answer: D
227. The principle of accountability is a principle by which specific action can be
traced back to:
A. A policy
B. An individual
C. A group
D. A manager
Answer: B
228. The principle of _________ is a principle by which specific action can be traced
back to anyone of your users.
A. Security
B. Integrity
C. Accountability
D. Policy
Answer: C
229 Controls provide accountability for individuals who are accessing sensitive
information. This accountability is accomplished:
A.) through access control mechanisms that require identification and authentication
and through the audit function.
B.) through logical or technical controls involving the restriction of access to systems
and the protection of information
C.) through logical or technical controls but not involving the restriction of access to
systems and the protection of information.
D.) through access control mechanisms that do not require identification and
authentication and do not operate through the audit function.
Answer: A
230. In addition to ensuring that changes to the computer system take place in an
identifiable and controlled environment, configuration management provides
assurance that future changes:
Answer: B
D. Communicate
Answer: A
232. Separation of duties is valuable in deterring:
A. DoS
B. external intruder
C. fraud
D. trojan horse
Answer: C
233. What principle requires that for particular sets of transactions, no single
individual be allowed to execute all transactions within the set?
A. Use of rights
B. Balance of power
C. Separation of duties
D. Fair use
Answer: C
234. Separation of duty can be:
A. Dynamic only
B. Encrypted
C. Static only
D. Static or dynamic
Answer: D
235. What is the company benefit, in terms of risk, for people taking a vacation of a
specified minimum length?
Answer: C
236. Which of the following would be less likely to prevent an employee from
reporting an incident?
A.) They are afraid of being pulled into something they don't want to be involved with
D.) They are unaware of the company's security policies and procedures
Answer: A
237. What should you do to the user accounts as soon as employment is terminated?
A. Disable the user accounts and erase immediately the data kept.
B. Disable the user accounts and have the data kept for a specific period of time.
D. Maintain the user accounts and have the data kept for a specific period of time.
Answer: B
A record of user logins with time and date stamps must be kept. User accounts shall
be disabled and data kept for a specified period of time as soon as employment is
terminated. All users must log on to gain network access.
238. What is the main objective of proper separation of duties?
Answer: C
239. Which of the following control pairing include organizational policies and
procedures, pre-employment background checks, strict hiring practices, employment
agreements, friendly and unfriendly employee termination procedures, vacation
scheduling, labeling of sensitive materials, increased supervision, security awareness
training, behavior awareness, and sign-up procedures to obtain access to information
systems and networks in?
Answer: A
240. Which of the following are functions that are compatible in a properly segregated
environment?
Answer: D
241. Controls are implemented to:
Answer: C
242. A timely review of system access audit records would be an example of which of
the basic security functions?
A.) avoidance
B.) deterrence
C.) prevention
D.) detection
Answer: D
243. A security control should
D. Change frequently.
Answer: C
244. What set of principles is the basis for information systems controls?
Answer: C
245. An audit trail is a category of what control?
A. System, Manual
B. Detective, Technical
C. User, Technical
D. Detective, Manual
Answer: B
246. An IDS is a category of what control?
A. Detective, Manual
B. Detective, Technical
C. User, Technical
D. System, Manual
Answer: B
247. Technical controls such as encryption and access control can be built into the
operating system, be software applications, or can be supplemental hardware/software
units. Such controls, also known as logical controls, represent which pairing?
Answer: B
248. Which of the following is not an example of an operation control?
Answer: C
249. Access control allows you to exercise directing influence over which of the
following aspects of a system?
Answer: B
250. ____________ is the means by which the ability to do something with a
computer resource is explicitly enabled or restricted.
A. Access control
B. Type of access
C. System resource
D. Work permit
Answer: A
251. The main categories of access control do NOT include:
Answer: C
252. A two factor authentication method is considered a:
A. Technical control
B. Patching control
C. Corrective control
D. Logical control
Answer: D
253. Which of the following are NOT considered technical controls?
B. Man trap
C. Passwords
D. Antivirus Software
Answer: B
254. Which of the following is NOT a type of access control?
A. Intrusive
B. Deterrent
C. Detective
D. Preventive
Answer: A
255. As a type of access control, which of the following asks for identifying
occurrences?
A. Deterrent
B. Preventive
C. Detective
D. Intrusive
Answer: C
256. As a type of access control, which of the following asks for discouraging
occurrence?
A. Detective
B. Intrusive
C. Deterrent
D. Preventive
Answer: C
257. As a type of access control, which of the following asks for restoring controls?
A. Deterrent
B. Intrusive
C. Corrective
D. Preventive
Answer: C
258. Access control is the collection of mechanisms that permits managers of a
system to exercise influence over the use of:
A. A man guard
B. An IS system
C. A threshold
D. A Trap
Answer: B
259. The Physical Security domain addresses three areas that can be utilized to
physically protect an enterprise's resources and sensitive information. Which of the
following is not one of these areas?
A.) Threats
B.) Countermeasures
C.) Vulnerabilities
D.) Risks
Answer: D
260. Which issue when selecting a facility site deals with the surrounding terrain,
building markings and signs, and high or low population in the area?
C.) accessibility
D.) visibility
Answer: D
261. Which of the following is not a physical control for physical security?
A.) lighting
B.) fences
C.) training
Answer: C
262. The main risks that physical security components combat are all of the following
EXCEPT:
C.) theft
D.) availability
Answer: A
263. Examples of types of physical access controls include all except which of the
following?
A.) badges
B.) locks
C.) guards
D.) passwords
Answer: D
264. The concentric circle approach is used to
Answer: B
265. Closed circuit TV is a feature of:
Answer: A
266. Motion detector is a feature of:
Answer: D
267. Which of the following is a physical control?
Answer: B
268. Which of the following is a detective control?
Answer: C
269. Controls like guards and general steps to maintain building security, securing of
server rooms or laptops, the protection of cables, and the backing up of files are some
of the examples of:
Answer: D
270. Which of the following measures would be the BEST deterrent to the theft of
corporate information from a laptop which was left in a hotel room?
A.) Store all data on disks and lock them in an in-room safe
B.) Remove the batteries and power supply from the laptop and store them separately
from the computer
Answer: D
271. Guards are appropriate whenever the function required by the security program
involves which of the following?
Answer: A
272. Sensor is:
A. Logical, Physical
B. Corrective, Logical
C. Detective, Physical
D. Corrective, Physical
Answer: C
273. Devices that supply power when the commercial utility power system fails are
called which of the following?
Answer: B
274. Under what conditions would use of a "Class C" hand-held fire extinguisher be
preferable to use of a "Class A" hand-held fire extinguisher?
Answer: B
275. Which of the following is a class C fire?
A.) electrical
B.) liquid
Answer: A
276. Under what conditions would the use of a Class C fire extinguisher be preferable
to a Class A extinguisher?
Answer: C
277. Which of the following is true about a "dry pipe" sprinkler system?
Answer: C
278. Which fire class can water be most appropriate for?
Answer: A
279. What category of water sprinkler system is currently the most recommended
water system for a computer room?
Answer: C
280. What fire suppression system can be used in computer rooms that will not
damage computers and is safe for humans?
A.) Water
B.) FM200
C.) Halon
D.) CO2
Answer: B
281. The following are fire detector types EXCEPT:
Answer: C
282. Which fire class can water be most appropriate for?
Answer: A
283. Which one of the following actions should be taken FIRST after a fire has been
detected?
C. Notify management
Answer: D
284. Which of the following provides coordinated procedures for minimizing loss of
life or injury and protecting property damage in response to a physical threat?
Answer: D
285. Disaster Recovery Plan emergency produces is a plan of action that commences
immediately to prevent or minimize property damage and to:
B. Minimize embarrassment.
Answer: C
286. What is the PRIMARY concern during a disaster?
D. Personnel safety.
Answer: D
287. What is the role of IKE within the IPsec protocol:
Answer: A
288. In a Public Key Infrastructure, how are public keys published?
Answer: B
289. Which of the following defines the key exchange for Internet Protocol Security
(IPSEC)?
Answer: A
A. 5
B. 10
C. 20
D. 25
Answer: A
291. What is the effective key size of DES?
A.) 56 bits
B.) 64 bits
Answer: A
292. Matches between which of the following are important because they represent
references from one relation to another and establish the connection among these
relations?
Answer: A
293. What is the PRIMARY advantage of secret key encryption systems as compared
with public key systems?
Answer: A
294. Which of the following can be defined as an attribute in one relation that has
values matching the primary key in another relation?
Answer: A
295. What uses a key of the same length as the message?
C.) Steganography
Answer: B
296. Which of the following statements related to a private key cryptosystem is
FALSE?
D.) Two different keys are used for the encryption and decryption
Answer: D
297. Who is responsible for the security and privacy of data during a transmission on
a public communications link?
A. The carrier
B. The sender
Answer: B
298. Which of the following best provides e-mail message authenticity and
confidentiality?
A.) Signing the message using the sender's public key and encrypting the message
using the receiver's private key
B.) Signing the message using the sender's private key and encrypting the message
using the receiver's public key
C.) Signing the message using the receiver's private key and encrypting the message
using the sender's public key
D.) Signing the message using the receiver's public key and encrypting the message
with the sender's private key
Answer: B
299. Cryptography does not help in:
Answer: D
300. How much more secure is 56 bit encryption opposed to 40 bit encryption?
A.) 16 times
Answer: D
Answer: D
302. The primary purpose for using one-way encryption of user passwords within a
system is which of the following?
A.) It prevents an unauthorized person from trying multiple passwords in one logon
attempt
B.) It prevents an unauthorized person from reading or modifying the password list
D.) It minimizes the amount of processing time used for encrypting password
Answer: B
303. Which of the following is not a known type of Message Authentication Code
(MAC)?
Answer: C
304. Where parties do not have a shared secret and large quantities of sensitive
information must be passed, the most efficient means of transferring information is to
use a hybrid encryption technique. What does this mean?
A.) Use of public key encryption to secure a secret key, and message encryption using
the secret key
B.) Use of the recipient's public key for encryption and decryption based on the
recipient's private key
Answer: A
305. One-way hash provides:
A.) Confidentiality
B.) Availability
C.) Integrity
D.) Authentication
Answer: C
306. What size is an MD5 message digest (hash)?
Answer: A
307. Which of the following is NOT a property of a one-way hash function?
A.) It converts a message of a fixed length into a message digest of arbitrary length.
B.) It is computationally infeasible to construct two different messages with the same
digest
C.) It converts a message of arbitrary length into a message digest of a fixed length
Answer: A
308. What are two types of ciphers?
Answer: C
309. Which one of the following, if embedded within the ciphertext, will decrease the
likelihood of a message being replayed?
A. Stop bit
B. Checksum
C. Timestamp
D. Digital signature
Answer: C
310. Which of the following statements pertaining to block ciphers is incorrect?
C.) Plain text is encrypted with a public key and decrypted with a private key
Answer: C
311. The repeated use of the algorithm to encipher a message consisting of many
blocks is called
A. Cipher feedback
B. Elliptical curve
D. Triple DES
Answer: C
312. When block chaining cryptography is used, what type of code is calculated and
appended to the data to ensure authenticity?
Answer: A
313. Which of the following statements pertaining to block ciphers is incorrect?
C.) Plain text is encrypted with a public key and decrypted with a private key
Answer: C
314. Which of the following is a symmetric encryption algorithm?
A.) RSA
C.) RC5
D.) El Gamal
Answer: C
315. How many bits is the effective length of the key of the Data Encryption Standard
Algorithm?
A.) 16
B.) 32
C.) 56
D.) 64
Answer: C
316. Compared to RSA, which of the following is true of elliptic curse cryptography?
Answer: D
317. Which of the following is not a one-way algorithm?
A.) MD2
B.) RC2
C.) SHA-1
D.) DSA
Answer: B
318. A public key algorithm that does both encryption and digital signature is which
of the following?
A.) RSA
B.) DES
C.) IDEA
D.) DSS
Answer: A
319. The RSA algorithm is an example of what type of cryptography?
Answer: A
320. How many rounds are used by DES?
A.) 16
B.) 32
C.) 64
D.) 48
Answer: A
321. Which of the following is the most secure form of triple-DES encryption?
A.) DES-EDE3
B.) DES-EDE1
C.) DES-EEE4
D.) DES-EDE2
Answer: A
A.) SHA-1
B.) MD2
C.) RC4
D.) MD5
Answer: C
323. Which of the following is unlike the other three?
A.) El Gamal
B.) Teardrop
D.) Smurf
Answer: A
324. Which of the following is not an encryption algorithm?
A.) Skipjack
B.) SHA-1
C.) Twofish
D.) DEA
Answer: B
325. What is the basis for the Rivest-Shamir-Adelman (RSA) algorithm scheme?
A. Permutations
B. Work factor
C. Factorability
D. Reversivibility
Answer: C
326. Which of the following encryption algorithms does not deal with discrete
logarithms?
A.) El Gamal
B.) Diffie-Hellman
C.) RSA
Answer: C
327. The RSA Algorithm uses which mathematical concept as the basis of its
encryption?
A.) Geometry
C.) PI ( π )
Answer: D
328. PGP provides which of the following? (Choose three)
A. Confidentiality
B. Accountability
C. Accessibility
D. Integrity
E. Interest
F. Non-repudiation
G. Authenticity
Answer: A,D,G
329. Which of the following mail standards relies on a "Web of Trust"?
Answer: B
PGP does not use a hierarchy of CA, or any type of formal trust certificates, but relies
on a "web of trust” in its key management approach. Each user generates and
distributes his or her public key, and users sign each other's public keys, which creates
a community of users who trust each other. This is different than the CA approach
where no one trusts each other, they only trust the CA.
330. Which of the following offers confidentiality to an e-mail message?
Answer: C
331. In a Secure Electronic Transaction (SET), how many certificates are required for
a payment gateway to support multiple acquires?
B. Two certificates for the gateway and two for the acquirers.
D. Two certificates for the gateway and two for each acquirer.
Answer: B
332. Which of the following best describes the Secure Electronic Transaction (SET)
protocol?
B.) Originated by VISA and MasterCard as an Internet credit card protocol using
digital signatures
C.) Originated by VISA and MasterCard as an Internet credit card protocol using the
transport layer
D.) Originated by VISA and MasterCard as an Internet credit card protocol using SSL
Answer: B
323. What encryption algorithm is best suited for communication with handheld
wireless devices?
A.) ECC
B.) RSA
C.) SHA
D.) RC4
Answer: A
324. Which security measure BEST provides non-repudiation in electronic mail?
A. Digital signature
Answer: A
335. Public key cryptography provides integrity verification through the use of public
key signature and ____________?
A. Secure hashes
B. Zero knowledge
D. Session key
Answer: C
336. Electronic signatures can prevent messages from being:
A.) Erased
B.) Disclosed
C.) Repudiated
D.) Forwarded
Answer: C
337. Why do vendors publish MD5 hash values when they provide software patches
for their customers to download from the Internet?
B. Recipients can confirm the authenticity of the site from which they are
downloading the patch.
C. Recipients can request future updates to the software by using the assigned hash
value.
D. Recipients need the hash value to successfully activate the new software.
Answer: A
338. Digital signature users register their public keys with a certification authority,
which distributes a certificate containing the user's public key and digital signature of
the certification authority. In creating the certificate, the user's public key and the
validity period are combined with what other information before computing the
digital signature?
B. User's private key and the identifier of the master key code
Answer: A
339. Which one of the following security technologies provides safeguards for
authentication before securely sending information to a web server?
C. Applets
D. Certificates
Answer: D
340. The primary role of cross certification is:
Answer: A
341. Windows 98 includes the ability to check the digitally signed hardware drivers.
Which of the following are true?
A.) Drivers are the only files supplied with W98 that can checked for digital
signatures and all drivers included with W98 have been digitally signed
B.) If a file on a windows W98 has been digitally signed it means that the file has
passed quality testing by Microsoft.
C.) The level to which signature checking is implemented could only be changed by
editing the registry
Answer: B
342. What is the purpose of certification path validation?
B. Checks that all certificates in the certification path refer to same certification
practice statement.
D. Checks that the names in the certification path are the same.
Answer: A
343. In what type of attack does an attacker try, from several encrypted messages, to
figure out the key using the encryption process?
Answer: B
344. The relative security of a commercial cryptographic system can be measured by
the?
A. Rating value assigned by the government agencies that use the system.
Answer: C
345. Which one of the following describes Kerchoff's Assumption for cryptoanalytic
attack?
Answer: A
346. Which of the following actions can make a cryptographic key more resistant to
an exhaustive attack?
Answer: B
347. Which type of attack is based on the probability of two different messages using
the same hash function producing a common message digest?
Answer: C
348. Frame-relay uses a public switched network to provide:
Answer: C
349. Which of the following is a Wide Area Network that was originally funded by
the department of Defense, which uses TCP/IP for data interchange?
Answer: A
350. Internet specifically refers to the global network of:
A.) public networks and Internet Service Providers (ISPs) throughout the world
B.) private networks and Internet Services Providers (ISPs) through the world
C.) limited networks and Internet Service Providers (ISPs) throughout the world
D.) point networks and Internet Service Providers (ISPs) throughout the world
Answer: A
351. Which of the following statements pertaining to Asynchronous Transfer Mode
(ATM) is false?
Answer: C
Answer: C
353. Fast ethernet operates at which of the following?
A.) 10 MBps
Answer: B
Answer: B
355. Frame relay and X.25 networks are part of which of the following?
Answer: C
356. A Wide Area Network (WAN) may be privately operated for a specific user
community, may support multiple communication protocols, or may provide network
connectivity and services via:
Answer: A
357. Which of the following is a LAN transmission protocol?
A.) Ethernet
C.) Unicast
D.) Polling
Answer: C
358. Which of the following access methods is used by Ethernet?
A.) CSMA/CD
B.) CSU/DSU
C.) TCP/IP
D.) FIFO
Answer: A
359. Unshielded (UTP) does not require the fixed spacing between connections that
is:
Answer: B
360. On which Open System Interconnection (OSI) Reference Model layer are
repeaters used as communications transfer devices?
A. Data-link
B. Physical
C. Network
D. Transport
Answer: B
A.) Transport
B.) Network
C.) Presentation
D.) Application
Answer: A
362. DNS, FTP, TFTP, SNMP are provided at what level of the OSI/ISO model?
A.) Application
B.) Network
C.) Presentation
D.) Transport
Answer: A
363. Which of the following OSI layers does not provide confidentiality?
A.) Presentation
B.) Network
C.) Transport
D.) Session
Answer: C
364. Which of the following OSI layers provides routing and related services?
A.) Network
B.) Presentation
C.) Session
C.) Physical
Answer: A
365. The International Standards Organization/Open Systems Interconnection
(ISO/OSI) Layers does NOT have which of the following characteristics?
B.) Used to gain information from network devices such as count of packets received
and routing tables
Answer: B
366. Which of the following layers supervises the control rate of packet transfers in an
Open Systems Interconnections (OSI) implementation?
A. Physical
B. Session
C. Transport
D. Network
Answer: C
367. ICMP and IGMP belong to which layer of the OSI model?
A.) Datagram
B.) Network
C.) Transport
D.) Link
Answer: B
368. The International Standards Organization / Open Systems Interconnection
(ISO/OSI) Layers 6 is which of the following?
Answer: B
369. Which OSI/ISO layer is IP implemented at?
Answer: C
370. Which of the following security-focused protocols operates at a layer different
from the others?
Answer: A
371. In the OSI/ISO model, at what layer are some of the SLIP, CSLIP, PPP control
functions are provided?
B.) Transport
C.) Presentation
D.) Application
Answer: A
372. Both TCP and UDP use port numbers of what length?
A.) 32 bits
B.) 16 bits
C.) 8 bits
D.) 4 bits
Answer: B
373. Which one of the following is an effective communications error-control
technique usually implemented in software?
A. Redundancy check
B. Packet filtering
C. Packet checksum
D. Bit stuffing
Answer: C
374. Each data packet is assigned the IP address of the sender and the IP address of
the:
A.) recipient
B.) host
C.) node
D.) network
Answer: A
A. PPTP
B. L2TP
C. IPSec
D. TACACS
Answer: D
376. On which port is POP3 usually run?
A.) 110
B.) 109
C.) 139
D.) 119
Answer: A
377. Telnet and rlogin use which protocol?
A.) UDP
B.) SNMP
C.) TCP
D.) IGP
Answer: C
378. The IP header contains a protocol field. If this field contains the value of 17,
what type of data is contained within the ip datagram?
A.) TCP
B.) ICMP
C.) UDP
D.) IGMP
Answer: C
Remarks:
Protocol field of ICMP = 1
Protocol field of TCP = 6
Protocol field of UDP = 17
379. Which of the following is true?
D.) UDP guarantees delivers of data. TCP does not guarantee delivery of data.
Answer: A
380. What works as an E-mail message transfer agent?
A.) SMTP
B.) SNMP
C.) S-RPC
D.) S/MIME
Answer: A
381. A common way to create fault tolerance with leased lines is to group several T-
1's together with an inverse multiplexer placed:
Answer: B
382. Which of the following is an IP address that is private (i.e. reserved for internal
networks and not a valid address to use on the internet)?
A.) 172.5.42.5
B.) 172.76.42.5
C.) 172.90.42.5
D.) 172.16.42.5
Answer: D
383. Which of the following is an ip address that is private (i.e. reserved for internal
networks and not a valid address to use on the internet)?
A.) 10.0.42.5
B.) 11.0.42.5
C.) 12.0.42.5
D.) 13.0.42.5
Answer: A
384. Which of the following is an ip address that is private (i.e. reserved for internal
networks and not a valid address to use on the internet)?
A.) 172.12.42.5
B.) 172.140.42.5
C.) 172.31.42.5
D.) 172.15.45.5
Answer: C
385. Which of the following is an ip address that is private (i.e. reserved for internal
networks and not a valid address to use on the Internet)?
A.) 192.168.42.5
B.) 192.166.42.5
C.) 192.175.42.5
D.) 172.1.42.5
Answer: A
386. How long are IPv4 addresses:
Answer: A
387. ARP and RARP map between which of the following?
Answer: D
388. Which protocol matches an Ethernet address to an Internet Protocol (IP) address?
Answer: B
389. Which of the following statements pertaining to firewalls is incorrect?
C.) All system logs on the firewall should log to a separate host
Answer: B
390. Which is the MAIN advantage of having an application gateway?
Answer: C
391. Which process on a firewall makes permit/deny forwarding decisions based
solely on address and service port information?
A. Circuit Proxy
C. Application Proxy
D. Transparency Proxy
Answer: A
392. Which of the following is the biggest concern with firewall security?
Answer: B
393. Which of the following statements pertaining to firewalls is incorrect?
A.) Firewalls may be bottlenecks between the internal and external network
B.) Firewalls allow for centralization of security services in machines optimized and
dedicated to the task
C.) Strong firewalls can protect a network at all layers of the OSI models
D.) Firewalls are used to create security checkpoints at the boundaries of private
networks
Answer: C
394. Which of the following is the least important security service provided by a
firewall?
Answer: B
395. Which of the following firewall rules is less likely to be found on a firewall
installed between an organization's internal network and internet?
Answer: C
396. Which of the following packets should NOT be dropped at a firewall protecting
an organization's internal network?
Answer: D
397. By examining the "state" and "context" of the incoming data packets, it helps to
track the protocols that are considered "connectionless", such as UDP-based
applications and Remote Procedure Calls (RPC). This type of firewall system is used
in:
Answer: C
398. Which of the following statements pertaining to packet filtering is incorrect?
Answer: D
399. A screening router can perform packet filtering based upon what data?
Answer: C
400. Why are hardware security features preferred over software security features?
Answer: D
401. Firewalls can be used to
Answer: A
402. What is NOT an authentication method within IKE and IPsec:
A.) CHAP
Answer: A
403. In IPSec, if the communication mode is gateway-gateway or host-gateway:
Answer: D
404. Which of the following Internet Protocol (IP) security headers are defined by the
Security Architecture for IP (IPSEC)?
Answer: B
405. Which of the following statements is not true of IPSec Transport mode?
Answer: A
406. What is the purpose of the Encapsulation Security Payload (ESP) in the Internet
Protocol (IP) Security Architecture for Internet Protocol Security?
Answer: B
407. How does the SOCKS protocol secure Internet Protocol (IP) connections?
Answer: D
408. Which of the following is NOT true of SSL?
Answer: A
409. In which way does a Secure Socket Layer (SSL) server prevent a "man-in-the-
middle" attack?
B. A 128 bit value is used during the handshake protocol that is unique to the
connection.
C. It uses only 40 bits of secret key within a 128 bit key length.
D. Every message sent by the SSL includes a sequence number within the message
contents.
Answer: A
410. Secure Shell (SSH) and Secure Sockets Layer (SSL) are very heavily used for
protecting
Answer: A
411. Which one of the following CANNOT be prevented by the Secure Shell (SSH)
program?
Answer: D
412. Another name for a VPN is a:
A.) tunnel
C.) pipeline
D.) bypass
Answer: A
A. Brute force
B. Man-in-the-middle
C. Traffic analysis
D. Replay
Answer: B
414. Which of the following is NOT an essential component of a VPN?
C.) authentication
D.) encryption
Answer: B
415. Virtual Private Network software typically encrypts all of the following
EXCEPT
C. HTTP protocol
D. Session information
Answer: B
416. Which of the following is less likely to be used in creating a Virtual Private
Network?
A.) L2TP
B.) PPTP
C.) IPSec
D.) L2F
Answer: D
417. Which one of the following instigates a SYN flood attack?
Answer: B
418. Which one of the following is defined as the process of distributing incorrect
Internet Protocol (IP) addresses/names with the intent of diverting traffic?
A. Network aliasing
D. Port scanning
Answer: B
419. Which of the following is true related to network sniffing?
B.) Sniffers alter the source address of a computer to disguise and exploit weak
authentication methods.
D.) Sniffers send IP fragments to a system that overlap with each other.
Answer: A
420. Which one of the following threats does NOT rely on packet size or large
volumes of data?
A. SYN flood
B. Spam
C. Ping of death
D. Macro virus
Answer: D
421. A TCP SYN Attack:
Answer: B
422. What attack is typically used for identifying the topology of the target network?
A. Spoofing
B. Brute force
C. Teardrop
D. Scanning
Answer: D
423. Which one of the following is the reason for why hyperlink spoofing attacks are
usually successful?
D. Most users do not make a request to connect to a DNS names, they follow
hyperlinks.
Answer: D
424. Which of the following identifies the first phase of a Distributed Denial of
Service attack?
Answer: D
425. This type of vulnerability enables the intruder to re-route data traffic from a
network device to a personal machine? This diversion enables the intruder to capture
data traffic to and from the devices for analysis or modification, or to steal the
password file from the server and gain access to user accounts.
Answer: B
426. Which one of the following is an example of hyperlink spoofing?
Answer: B
427. Why packet filtering routers NOT effective against mail bomb attacks?
B. Mail bombs are polymorphic and present no consistent signature to filter on.
D. The bomb code is hidden in the header and appears as a normal routing
information.
Answer: C
428. Which one of the following correctly identifies the components of a Distributed
Denial of Service Attack?
Answer: B
429. Which one of the following is a passive network attack?
A. Spoofing
B. Traffic Sniffing
C. Playback
D. Masquerading
Answer: B
430. What is called an attach where the attacker spoofs the source IP address in an
ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in
order to flood it with REPLY packets?
Answer: B
431. Which type of attack involves the alteration of a packet at the IP level to
convince a system that it is communicating with a known entity in order to gain
access to a system?
Answer: B
432. What attack is primarily based on the fragmentation implementation of IP and
large ICMP packet size?
A. Exhaustive
B. Brute force
C. Ping of Death
D. Spoofing
Answer: C
433. Land attack attacks a target by:
Answer: C
434. What attack is primarily based on the fragmentation implementation of IP?
A. Teardrop
B. Exhaustive
C. Spoofing
D. Brute force
Answer: A
435. What attack floods networks with broadcast traffic so that the network is
congested?
A. Spoofing
B. Teardrop
C. Brute force
D. SMURF
Answer: D
436. What attack involves repeatedly sending identical e-message to a particular
address?
A. SMURF
B. Brute force
C. Teardrop
D. Spamming
Answer: D
437. A stack overflow attack that "crashes" a Transmission Control Protocol/Internet
Protocol (TCP/IP) service daemon can result in a serious security breach because the
Answer: B
438. The intrusion detection system at your site has detected Internet Protocol (IP)
packets where the IP source address is the same as the destination address. This
situation indicates
Answer: B
439. What type of attacks occurs when a rogue application has been planted on an
unsuspecting user's workstation?
A. Physical attacks
B. Logical attacks
Answer: C
440. Which of the following threats is not addressed by digital signature and token
technologies?
A.) Spoofing
D.) denial-of-service
Answer: D
441. Which one of the following is concerned with masking the frequency, length,
and origin-destination patterns of the communications between protocol entities?
A. Masking analysis
B. Protocol analysis
C. Traffic analysis
D. Pattern analysis
Answer: C
442. Which of the following would NOT be considered a Denial of Service Attack?
B.) Smurf
D.) TearDrop
Answer: A
443. Which step ensures the confidentiality of a facsimile transmission?
Answer: C
444. Which one of the following could a company implement to help reduce PBX
fraud?
A. Call vectoring
C. Teleconferencing bridges
Answer: B
445. Which of the following is a telecommunication device that translates data from
digital to analog form and back to digital?
A.) Multiplexer
B.) Modem
D.) Concentrator
Answer: B
446. The underlying reason for creating a disaster planning and recover strategy is to
Answer: A
Answer: C
448. Organizations should not view disaster recovery as which of the following?
Answer: B
449. Which of the following statements pertaining to disaster recovery is incorrect?
A.) A recovery team's primary task is to get the pre-defined critical business functions
at the alternate backup processing site.
B.) A salvage team's task is to ensure that the primary site returns to normal
processing conditions
C.) The disaster recovery plan should include how the company will return from the
alternate site to the primary site
D.) When returning to the primary site, the most critical applications should be
brought back first
Answer: D
450. Which of the following statements pertaining to dealing with the media after a
disaster occurred and disturbed the organization's activities is incorrect?
A.) The CEO should always be the spokesperson for the company during a disaster
B.) The disaster recovery plan must include how the media is to be handled during the
disaster
C.) The organization's spokesperson should report bad news before the press gets a
hold of it through another channel
Answer: A
451. What is a disaster recovery plan for a company's computer system usually
focused on?
Answer: A
452. What is the most critical piece to disaster recovery and continuity planning?
Answer: B
453. Which of the following is the most important consideration in locating an
alternate computing facility during the development of a disaster recovery plan?
Answer: A
454. Which of the following are PRIMARY elements that are required when
designing a Disaster Recovery Plan (DRP)?
Answer: C
455. Emergency actions are taken at the incipient stage of a disaster with the
objectives of preventing injuries or loss of life and of:
Answer: D
456. Which of the following steps should be performed first in a business impact
analysis (BIA)?
Answer: A
457. What methodology is commonly used in Business Continuity Program?
Answer: B
458. A Business Impact Analysis (BIA) does not:
B.) Determine critical and necessary business functions and their resource
dependencies
C.) Identify critical computer applications and the associated outage tolerance
Answer: A
459. What assesses potential loss that could be caused by a disaster?
Answer: B
460. Which of the following will a Business Impact Analysis (BIA) NOT identify?
A.) Areas that would suffer the greatest financial or operation loss in the event of a
disaster
D.) The outage time that can be tolerated by the enterprise as a result of a disaster
Answer: C
461. System reliability s increased by:
Answer: B
462. When preparing a business continuity plan, who of the following is responsible
for identifying and prioritizing time-critical systems?
Answer: B
463. Business Continuity Plan development depends most on:
Answer: B
464. Which primary element of BCP includes carrying out vulnerability analysis?
Answer: B
465. To mitigate the impact of a software vendor going out of business, a company
that uses vendor software should require which one of the following?
Answer: B
466. Which one of the following processing alternatives involves a ready-to-use
computing facility with telecommunications equipment, but not computers?
C. Cold site
D. Warm site
Answer: D
467. What is a hot-site facility?
B.) A site is which space is reserved with pre-installed wiring and raised floors
C.) A site with raised flooring, air conditioning, telecommunications, and networking
equipment, and UPS
D.) A site with ready made work space with telecommunications equipment, LANs,
PCs, and terminals with work groups
Answer: A
468. Contracts and agreements are unenforceable in which of the following alternate
back facilities?
Answer: D
469. Which of the following computer recovery sites is the least expensive and the
most difficulty to test?
Answer: D
470. Which of the following is an advantage of the use of hot sites as a backup
alternative?
B.) Hot sites can be made ready for operation within a short period of time
D.) Hot sites do not require that equipment and systems software be compatible with
the primary installation being backed up
Answer: B
471. What is not a benefit of Cold Sites?
Answer: B
472. Which of the following alternative business recovery strategies would be LEAST
appropriate in a large database and on-line communications network environment
where the critical business continuity period is 7 days?
Answer: D
473. Which of the following statement pertaining to the maintenance of an IT
contingency plan is incorrect?
A.) The plan should be reviewed at least once a year for accuracy and completeness
B.) The Contingency Planning Coordinator should make sure that every employee
gets an up-to-date copy of the plan
D.) Copies of the plan should be provided to recovery personnel for storage at home
and office
Answer: B
474. Scheduled tests of application contingency plans should be based on the
Answer: C
475. In the public sector, as opposed to the private sector, due care is usually
determined by
B. Legislative requirements.
C. Insurance rates.
Answer: B
476. Which of the following exceptions is less likely to make hearsay evidence
admissible in court?
C.) Records are collected at or near the time of occurrence of the act being
investigated
Answer: B
477. Once evidence is seized, a law enforcement officer should emphasize which of
the following?
Answer: B
478. In order to preserver a proper chain of custody of evidence?
A.) Evidence has to be collected following predefined procedures in accordance with
all laws and legal regulations
B.) Law enforcement officials should be contacted for advice on how and when to
collect critical information
C.) Verifiable documentation indicating the sequence of individuals who have handled
a piece of evidence should be available.
D.) Log files containing information regarding an intrusion are retained for at least as
long as normal business records, and longer in the case of an ongoing investigation.
Answer: A
479. Why is the investigation of computer crime involving malicious damage
especially challenging?
D. Reports resulting from common user error often obscure the actual violation.
Answer: B
480. What category of law deals with regulatory standards that regulate performance
and conduct? Government agencies create these standards, which are usually applied
to companies and individuals within those companies.
Answer: D
481. Something that is proprietary to that company and importance for its survival and
profitability is what type of intellectual property law?
C.) Patent
Answer: D
482. Which category of law is also referenced as a Tort law?
Answer: A
483. What is the primary goal of incident handling?
B.) Improve the company's ability to be prepared for threats and disasters
Answer: D
A.) moral
B.) ethical
C.) legal
D.) control
Answer: D
485. A disk image backup is used for forensic investigation because it
C. Time stamps the files with the date and time of the copy operation.
Answer: B
486. Which is a characteristic of IDEA?
A. 56 bytes block
B. 64 bits block
C. 64 bytes block
Answer: B
487. A programmer creates a virus producing tool in order to test the performance of a
new virus diction product.
A. This is ethical because it was created to test and enhance the performance of a
virus protection tool
B. It's unethical because the virus creating tool may become available to the public.
Answer: B
488. In a discretionary mode, which of the following entities is authorized to grant
information access to other people?
A. Manager
B. Group leader
C. Security manager
D. User
Answer: D
489. Intrusion detection has which of the following sets of characteristics.
Answer: D
490. Why does compiled code pose more risk than interpreted code?
A. Because malicious code can be embedded in the compiled code and can be
difficult to detect.
D. It does not. Interpreted code poses more risk than compiled code.
Answer: A
491. If an operating system permits executable objects to be used simultaneously by
multiple users without a refresh of the objects, what security problem is most likely to
exist?
Answer: A
492. Which of the following is used in database information security to hide
information?
A. Inheritance
B. Polyinstantiation
C. Polymorphism
D. Delegation
Answer: B
493. What attack involves the perpetrator sending spoofed packet(s) with the SYN
flag set to the victim's machine on any open port that is listening?
A. Bonk attack
B. Land attack
C. Teardrop attack
D. Smurf attack
Answer: B
The Land attack involves the perpetrator sending spoofed packet(s) with the
SYN flag set to the victim's machine on any open port that is listening. If the packet(s)
contain the same destination and source IP address as the host, the victim's machine
could hang or reboot.
494. Ensuring that printed reports reach proper users and that receipts are signed
before releasing sensitive documents are examples of?
A. Deterrent controls
B. Output controls
D. Asset controls
Answer: B
495. Making sure that the data is accessible when and where it is needed is which of
the following?
A. Confidentiality
B. Integrity
C. Acceptability
D. Availability
Answer: D
496. Which layer defines the X.25, V.35, X,21 and HSSI standard interfaces?
A. Transport layer
B. Network layer
D. Physical layer
Answer: D
497. Which of the following statements pertaining to VPN protocol standards is false?
B. L2TP and PPTP were designed for single point-to-point client to server
communication.
Answer: C
PPTP and L2TP are Layer 2 tunneling protocols; both encapsulate the payload in a
Point-to-Point Protocol (PPP) frame to be sent across an intermediate network.
498. The guarantee that the message sent is the message received, and that the
message was not intentionally or unintentionally altered is?
A. Integrity
B. Confidentiality
C. Availability
D. Identity
Answer: A
499. An offsite backup facility intended to operate an information processing facility,
having no computer or communications equipment, but having flooring, electrical
writing, air conditioning, etc. is better known as a?
A. Hot site
C. Cold site
D. Warm site
Answer: C
500. Why is public key cryptography recommended for use in the process of securing
facsimiles during transmission?
Answer: D
501. Database views are not used to:
D. Implement need-to-know.
Answer: A
502. Which of the following statements pertaining to the Trusted Computer System
Evaluation Criteria (TCSEC) is incorrect?
Answer: A
503. Which of the following is an ip address that is private? (i.e. reserved for internal
networks, and not a valid address to use on the Internet)?
A. 172.5.42.5
B. 172.76.42.5
C. 172.90.42.5
D. 172.16.42.5
Answer: D
504. How fast is private key cryptography compared to public key cryptography?
Answer: C
505. In an organization, an Information Technology security function should:
Answer: C
506. Packet Filtering Firewalls system is considered a?
Answer: A
507. Which of the following can be used as a covert channel?
Answer: A
508. In order to ensure the privacy and integrity of the data, connections between
firewalls over public networks should use?
A. Screened subnets
B. Digital certificates
D. Encryption
Answer: C
509. Which of the following is unlike the other three?
A. El Gamal
B. Teardrop
C. Buffer Overflow
D. Smurf
Answer: A
510. Immune to the effects of electromagnetic interference (EMI) and therefore has a
much longer effective usable length (up to two kilometers in some cases) is?
A. Coaxial cable
C. Axial cable
Answer: D
511. Which of the following is the most reliable, secure means of removing data from
magnetic storage media such as a magnetic tape, or cassette?
A. Degaussing
C. Certification
D. Buffer overflow
Answer: A
512. Which integrity model defines a constrained data item, an integrity verification
procedure and a transformation procedure?
Answer: C
513. What are suitable protocols for securing VPN connections?
Answer: C
514. RAID Level 1 mirrors the data from one disk to set of disks using which of the
following techniques?
Answer: A
515. A cluster looks like a?
Answer: A
516. Which of the following is responsible for the most security issues?
A. Outside espionage
B. Hackers
C. Personnel
D. Equipment failure
Answer: C
517. Which of the following best describes the purpose of debugging programs?
A. To generate random data that can be used to test programs before implementing
them
C. To protect, during the programming phase, valid changes from being overwritten
by other changes.
Answer: B
518. What is the process that RAID Level 0 uses as it creates one large disk by using
several disks?
A. Striping
B. Mirroring
C. Integrating
D. Clustering
Answer: A
519. Which of the following is used to create and delete views and relations within
tables?
Answer: A
SQL supports the data definition language (DDL) for creating, altering, and
deleting tables and other database objects.
520. The Diffie-Hellman algorithm is used for?
A. Encryption
B. Digital signature
C. Key exchange
D. Non-repudiation
Answer: C
521. Which of the following is not considered firewall technology?
A. Screened subnet
B. Screened host
Answer: C
522. Why is fiber the most secure means of transmission?
Answer: B
523. What is a commercial application of steganography that is used to identify
pictures or verify their authenticity?
A. A MAC
B. A digital checksum
C. A MD5 hash
D. A digital signature
E. A watermark
Answer: E
524. Which of the following is a connection-orientated protocol?
A. IP
B. UDP
C. TCP
D. ICMP
Answer: C
525. Which of the following can reproduce itself without the help of system
applications or resources?
A. Trojan
B. Logic bomb
C. Virus
D. Worm
Answer: D
526. _______ are the step-by-step instructions used to satisfy control requirements.
A. Policy
B. Procedure
C. Guideline
D. Standard
Answer: B
527. ____________ is the first step of access control.
A. Identification
B. Authorization
C. Validation
D. Interrogation
Answer: A
528. Which of the following is an example of a symmetric key algorithm?(Choose all
that apply)
A. Rijndael
B. RSA
C. Diffie-Hellman
D. Knapsack
E. IDEA
Answer: A,E.