0% found this document useful (0 votes)
156 views17 pages

Principle of Security QA

Hash functions generate a message digest or summary that can be used to confirm the identity and integrity of a message. They convert variable-length messages into fixed-length values.

Uploaded by

Ben Evado
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views17 pages

Principle of Security QA

Hash functions generate a message digest or summary that can be used to confirm the identity and integrity of a message. They convert variable-length messages into fixed-length values.

Uploaded by

Ben Evado
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

____ functions are mathematical algorithms that generate a message summary

or digest to confirm the identity of a specific message and to confirm that there
have not been any changes to the content.
Selected Answer:
Hash
Answers:
Hash
Map
Key
Encryption
Question 2

A method of encryption that requires the same secret key to encipher and
decipher the message is known as ____ encryption.
Selected Answer:
symmetric
Answers:

asymmetric

symmetric
public
private

A false positive is the failure of an IDPS system to react to an actual attack event.

Answers:

True
False

Most of the technologies that scan human characteristics convert these images
to some form of minutiae.
Selected Answer:

True

Answers:

True
False

____ is a specially configured connection on a network device that is capable of


viewing all of the traffic that moves through the entire device.
Selected Answer:
SPAN
Answers:

NIDPS

SPAN
DPS
IDSE

Class C fires are those fueled by combustible metals, such as magnesium,


lithium, and sodium.
Selected Answer:
Answers:

False
True
False

Physical security is just as important as logical security to an information security


program.
Selected Answer:

True

Answers:

True
False

Enticement is the action of luring an individual into committing a crime to get a


conviction.
Selected Answer:
Answers:

False
True
False

The ____ is the level at which the number of false rejections equals the false
acceptances, and is also known as the equal error rate.
Selected Answer:
CER

Answers:

BIOM
REC
IIS

CER

A common form of mechanical strike locks are electric strike locks, which
(usually) require people to announce themselves before being buzzed through
a locked door.
Selected Answer:
Answers:

False
True
False

Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to


protect against electronic payment fraud.
Selected Answer:

True

Answers:

True
False

A wireless security toolkit should include the ability to sniff wireless traffic, scan
wireless hosts, and assess the level of privacy or confidentiality afforded on the
wireless network.
Selected Answer:

True

Answers:

True
False

A name badge is typically worn concealed.


Selected Answer:
Answers:

False
True
False

A(n) response attack is an attempt to resubmit a recording of the deciphered


authentication to gain entry into a secure source.
Selected Answer:
Answers:

False
True
False

Once the OS is known, all of the vulnerabilities to which a system is susceptible


can easily be determined.
Selected Answer:

True

Answers:

True
False

The most sophisticated locks are ____ locks.

Selected Answer:
biometric
Answers:

manual
programmable
electronic

biometric

Most guards have clear ____ that help them to act decisively in unfamiliar
situations.
Selected Answer:
SOPs
Answers:

MACs

SOPs
POSs
OPSs

Keycard readers based on smart cards are often used to secure computer rooms,
communications closets, and other restricted areas.
Selected Answer:

True

Answers:

True

False

Cold detectors measure rates of change in the ambient temperature in the room.
Selected Answer:
Answers:

False
True
False

Hash algorithms are public functions that create a hash value by converting
variable-length messages into a single fixed-length value.
Selected Answer:

True

Answers:

True
False

Symmetric encryption uses two different but related keys, and either key can be
used to encrypt or decrypt the message.
Selected Answer:
Answers:

False
True
False

In the ____ approach, the sensor detects an unusually rapid increase in the area
temperature within a relatively short period of time.

Selected Answer:
rate-of-rise
Answers:

fixed temperature
permanent temperature
fixed rate

rate-of-rise

Vibration sensors fall into the motion sensor category.


Selected Answer:
Answers:

False
True
False

A HIDPS can monitor systems logs for predefined events.


Selected Answer:

True

Answers:

True
False

Common implementations of RA include systems that issue digital certificates to


users and servers; directory enrollment; key issuing systems; tools for managing
the key issuance; and verification and return of certificates.

Selected Answer:

False

Answers:

True
False

A(n) man-in-the-middle attack attempts to intercept a public key or even to insert


a known key structure in place of the requested public key.
Selected Answer:

True

Answers:

True
False

____ involves a wide variety of computing sites that are distant from the base
organizational facility and includes all forms of telecommuting.
Selected Answer:
Remote site computing
Answers:
Remote site computing
Telecommuting
Remote working
Hot site computing

A device that assures the delivery of electric power without interruption is a(n)
____.

Selected Answer:
UPS
Answers:

GFCI
HVAC
GPS

UPS

____ is the action of luring an individual into committing a crime to get a


conviction.
Selected Answer:
Entrapment
Answers:
Entrapment
Enticement
Intrusion
Padding

SPS systems provide power conditioning.


Selected Answer:
Answers:

False
True

False

A ____ system is designed to work in areas where electrical equipment is used.


Instead of containing water, the system contains pressurized air.
Selected Answer:
dry-pipe
Answers:

wet-pipe

dry-pipe
deluge
sprinkler

The AES algorithm was the first public key encryption algorithm.
Selected Answer:
Answers:

False
True
False

Carbon dioxide systems rob fire of its oxygen.


Selected Answer:

True

Answers:

True
False

____ is the entire range of values that can possibly be used to construct an
individual key.
Selected Answer:
Keyspace
Answers:

Code

Keyspace
Algorithm
Cryptogram

Fingerprinting is the organized research of the Internet addresses owned or


controlled by a target organization.

Answers:

True
False

The trace usually consists of a honeypot or padded cell and an alarm.


Selected Answer:
Answers:

False
True
False

A HIDPS is optimized to detect multihost scanning, and it is able to detect the


scanning of non-host network devices, such as routers or switches.
Selected Answer:
Answers:

False
True
False

Class ____ fires are extinguished by agents that remove oxygen from the fire.
Selected Answer:
B
Answers:

B
C
D

Fire ____ systems are devices installed and maintained to detect and respond to a
fire, potential fire, or combustion danger situation.
Selected Answer:
suppression
Answers:

detection

suppression
protection
prevention

A starting scanner is one that initiates traffic on the network in order to


determine security holes.
Selected Answer:
Answers:

False
True
False

Which of the following ports is commonly used for the HTTP protocol?
Selected Answer:
80
Answers:

20
25
53

80

The number of horizontal and vertical pixels captured and recorded is known as
the images depth.

Answers:

True
False

Using ____, the system reviews the log files generated by servers, network
devices, and even other IDPSs.
Selected Answer:
LFM
Answers:
LFM
stat IDPS
AppIDPS
HIDPS

A wet-pipe system is usually considered appropriate in computer rooms.

Answers:

True
False

Once the attacker has successfully broken an encryption, he or she may launch a
replay attack, which is an attempt to resubmit a recording of the deciphered
authentication to gain entry into a secure source.

Answers:

True
False

IDPS researchers have used padded cell and honeypot systems since the late
____.
Selected Answer:
1980s
Answers:

1960s
1970s

1980s
1990s

Bit stream methods commonly use algorithm functions like the exclusive OR
operation (____).
Selected Answer:
XOR
Answers:
XOR
EOR
NOR

OR

NIDPSs can reliably ascertain if an attack was successful or not.


Selected Answer:
Answers:

False
True
False

The SHTTP security solution provides six services: authentication by digital


signatures, message encryption, compression, e-mail compatibility,
segmentation, and key management.
Selected Answer:
Answers:

False
True
False

In order to determine which IDPS best meets an organizations needs, first


consider the organizational environment in technical, physical, and political
terms.
Selected Answer:

True

Answers:

True
False

You might also like