Top-Rated Free Essay
Preview

Computer Information Security

Satisfactory Essays
1476 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Information Security
Question 1.

Objective: Carry out appropriate risk mitigation strategies.

Which of the following BEST describes both change and incident management?
a) Incident management is not a valid term in IT, however change management is
b) Change management is not a valid term in IT, however incident management is
c) Incident management and change management are interchangeable terms meaning the same thing
d) Incident management is for unexpected consequences, change management is for planned work

Question 2.

Objective: Implement appropriate security controls when performing account management.

Which of the following account policy controls requires a user to enter a 15 character alpha-numerical password?
a) Disablement
b) Length
c) Expiration
d) Password complexity

Question 3.

Objective: Implement appropriate security controls when performing account management.

Which of the following information types would be considered personally identifiable information?
a) First name and home address
b) Social security number
c) Date of birth
d) Full name, date of birth and address

Question 4.

Objective: Explain the importance of data security.

Which of the following is the benefit of single file versus full disk encryption?
a) Encryption is preserved in full disk encryption when a file is copied from one media to another
b) Encryption is preserved in single file encryption when a file is copied from one media to another
c) Single file encryption provides better security when decrypting single files than full disk encryption when properly implemented and used
d) Full disk encryption provides better security when decrypting single files than single file encryption when properly implemented and used

Question 5.

Objective: Explain the fundamental concepts and best practices related to authentication, authorization and access control.

Which of the following is another name for a CAC?
a) Token
b) RFID
c) MAC
d) PIV

Question 6.

Objective: Explain the fundamental concepts and best practices related to authentication, authorization and access control.

Which of the following systems offers Trusted OS capabilities by default?
a) Windows Vista
b) Windows 7
c) SE Linux
d) Backtrack

Question 7.

Objective: Carry out appropriate procedures to establish host security.

Which of the following describes a common operational problem when using patch management software that results in a false sense of security?
a) Conflicts with vulnerability scans impede patch effectiveness
b) Distributed updates may fail to apply or may not be active until a reboot
c) Vendor patches are released too frequently consuming excessive network bandwidth
d) It is resource intensive to test all patches

Question 8.

Objective: Analyze and differentiate among types of attacks.

Which of the following is BEST identified as an attacker who has or is about to use a Logic bomb?
a) Grey hat
b) Malicious insider
c) White hat
d) Black box

Question 9.

Objective: Explain the importance of security related awareness and training.

Which of the following is the BEST choice in regards to training staff members on dealing with PII?
a) PII requires public access but must be flagged as confidential
b) PII data breaches are always the result of negligent staff and punishable by law
c) PII must be handled properly in order to minimize security breaches and mishandling
d) PII must be stored in an encrypted fashion and only printed on shared printers

Question 10.

Objective: Explain the importance of data security.

Which of the following processes are used to avoid employee exhaustion and implement a system of checks and balances?
a) Job rotation
b) Incident response
c) Least privilege
d) On-going security

Question 11.

Objective: Explain risk related concepts.

When designing secure LDAP compliant applications, null passwords should NOT be allowed because:
a) null password can be changed by all users on a network
b) a null password is a successful anonymous bind
c) null passwords can only be changed by the administrator
d) LDAP passwords are one-way encrypted

Question 12.

Objective: Explain the fundamental concepts and best practices related to authentication, authorization and access control.

A security administrator visits a remote data center dressed as a delivery person. Which of the following is MOST likely being conducted?
a) Social engineering
b) Remote access
c) Vulnerability scan
d) Trojan horse

Question 13.

Objective: Analyze and differentiate among types of social engineering attacks.

Mobile devices used in the enterprise should be administered using:
a) encrypted networks and system logging
b) full disk encryption and central password management
c) vendor provided software update systems
d) centrally managed update services and access controls

Question 14.

Objective: Implement appropriate security controls when performing account management.

The Chief Information Officer (CIO) wants to implement widespread network and hardware changes within the organization. The CIO has adopted an aggressive deployment schedule and does not want to bother with documentation, because it will slow down the deployment. Which of the following are the risks associated with not documenting the changes?
a) Undocumented networks might not be protected and can be used to support insider attacks
b) Documenting a network hinders production because it is time consuming and ties up critical resources
c) Documented networks provide a visual representation of the network for an attacker to exploit
d) Undocumented networks ensure the confidentiality and secrecy of the network topology

Question 15.

Objective: Carry out appropriate risk mitigation strategies.

Which of the following could mitigate shoulder surfing?
a) Privacy screens
b) Hashing
c) Man traps
d) Screen locks

Question 16.

Objective: Analyze and differentiate among types of mitigation and deterrent techniques .

Which of the following passwords is the MOST complex?
a) 5@rAru99
b) CarL8241g
c) j1l!1b5
d) l@ur0

Question 17.

Objective: Implement appropriate security controls when performing account management.

Which of the following is being utilized when the BIOS and operating system’s responsibility is platform integrity?
a) SSL
b) USB encryption
c) Data loss prevention
d) TPM

Question 18.

Objective: Explain the importance of data security.

Which of the following BEST describes a Buffer Overflow attack that allows access to a remote system?
a) The attacker attempts to have the receiving server run a payload using programming commonly found on web servers
b) The attacker overwhelms a system or application, causing it to crash and bring the server down to cause an outage
c) The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information
d) The attacker overwhelms a system or application, causing it to crash, and then redirects the memory address to read from a location holding the payload

Question 19.

Objective: Analyze and differentiate among types of application attacks.
A company fails to monitor and maintain the HVAC system in the datacenter. Which of the following is the MOST likely to affect availability of systems?
a) Employee productivity in a hot datacenter
b) Premature failure of components
c) Decreased number of systems in the datacenter
d) Increased utility costs

Question 20.

Objective: Explain the impact and proper use of environmental controls.
Which of the following protocols is defined in RFC 1157 as utilizing UDP ports 161 and 162?
a) SNMP
b) IPSec
c) SSL
d) TLS

Question 21.

Objective: Explain the impact and proper use of environmental controls.

Which of the following is LEAST likely to have a legitimate business purpose?
a) Metasploit
b) Vulnerability scanner
c) Steganography
d) Port scanner

Question 22.

Objective: Explain the importance of data security.
Which of the following does full disk encryption on a laptop computer NOT protect against?
a) Confidentiality of the data
b) Key loggers
c) Theft of the data
d) Disclosure of the data

Question 23.

Objective: Implement appropriate security controls when performing account management.
Which of the following passwords exemplifies the STRONGEST complexity?
a) Passw0rd
b) P@ssw0rd
c) Passwrd
d) passwordpassword

Question 24.

Objective: Implement assessment tools and techniques to discover security threats and vulnerabilities.
Which following port ranges would give a technician the MOST comprehensive port scan of a server?
a) 1024-15000
b) 0-99999
c) 0-65535
d) 0-1024

Question 25.

Objective: Analyze and differentiate among types of wireless attacks.
Which of the following attacks steals contacts from a mobile device?
a) Bluesnarfing
b) Smurf attack
c) Session hijacking
d) Bluejacking

Question 26.

Objective: Analyze and differentiate among types of wireless attacks.
Which of the following attacks sends unwanted messages to a mobile device?
a) Session hijacking
b) Smurf attack
c) Bluejacking
d) Bluesnarfing

Question 27.

Objective: Analyze and differentiate among types of attacks.
A smurf attack relies on which protocol to perform a Denial of Service?
a) DNS
b) SNMP
c) SMTP
d) ICMP

Question 28.

Objective: Distinguish and differentiate network design elements and components.
Which of the following allows for multiple operating systems to run on a single piece of hardware?
a) Virtualization
b) Port security
c) Remote access
d) DMZ

Question 29.

Objective: Explain the fundamental concepts and best practices related to authentication, authorization and access control.
A user name is an example of which of the following?
a) Identification
b) Authentication
c) Authorization
d) Access

Question 30.

Objective: Explain the core concepts of public key infrastructure.
The CRL contains a list of:
a) private keys
b) public keys
c) root certificates
d) valid certificates

You May Also Find These Documents Helpful

  • Good Essays

    Then we create a checksum for the decrypted file after decryption to make sure the file has not been altered.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    12. Relate back to the C-I-A tenets of information systems security. Hashing provides file versioning while encryption provides file…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    B. Provides a convenient way to name a set of data for easier operations like copying and moving…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Good Essays

    9. A student writes a report using a word processor, saving the report in a file called my report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of the following are some of the important features supplied by files as defined by a computer OS? (Choose three answers.)…

    • 856 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    b. It travels down each layer to the physical layer and is sent via some physical media to the destination and goes back up the OSI model.…

    • 1636 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Which file system provides support for larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users? NTFS is use for security encryption. FAT32 has no security encryption that one reason why Microsoft made NTSF so people can some type of security encryption. It is available in all versions of Windows developed for business environments from Windows 2000 onwards. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    There are many tools and suites designed to aid the security practitioner and the organization in…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT 1230 CLIENT

    • 374 Words
    • 2 Pages

    b. RAID 1: usually preferred to as mirroring. Provides redundancy by duplicating all the data from one drive on a second drive so that if either drive fails, no data is loss.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    A user would like to secure files stored on a floppy disk. Which file system should they select to format the disk?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lesson 1

    • 1154 Words
    • 7 Pages

    5. A backup file is smaller than a portable company file of the same company.…

    • 1154 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    (2) The files must not be transmitted in any form to any third parties who are not…

    • 2675 Words
    • 29 Pages
    Powerful Essays