Exam 4: Engineering
Exam 1: Assessment7 Questions
Exam 2: Assets9 Questions
Exam 3: Communication39 Questions
Exam 4: Engineering69 Questions
Exam 5: ID and Access17 Questions
Exam 6: Management51 Questions
Exam 7: Operations85 Questions
Exam 8: Software22 Questions
Select questions type
Bill is storing and transmitting data that can only be read by those that are intended to read it. What is Bill practicing?
(Multiple Choice)
4.8/5
(24)
For a cipher to be strong and avoid being broken, two elements must be a part of the encryption. Which attribute causes a single plaintext bit to have influence over several other ciphertext bits?
(Multiple Choice)
4.8/5
(35)
It has been raining on and off the last month and extremely hot on some days. There has been a lot of static and it appears that one of the wires at your desk is corroding. What can cause these two problems?
(Multiple Choice)
4.7/5
(37)
What protocol works at the transport layer and performs authentication by certification?
(Multiple Choice)
4.9/5
(36)
What was the first attempt at establishing a single standard for evaluating security attributes of computer systems and products by many European countries?
(Multiple Choice)
4.8/5
(31)
In Paul's office, everyone has access to a computer that only holds secret data. What type of security mode does this office use?
(Multiple Choice)
4.8/5
(39)
What security model was created to provide access controls that can change dynamically depending upon a user's previous actions and is known as the Chinese Wall model?
(Multiple Choice)
4.8/5
(39)
Often, information security experts just focus on attacks through a port, modem, or wireless access port and overlook the possibility of physical attacks. What would be considered a physical attack?
(Multiple Choice)
4.8/5
(42)
Mike is placing portable fire extinguishers around the building where there is electrical equipment. How far should these fire extinguishers be from the electrical equipment?
(Multiple Choice)
4.9/5
(33)
I want to find out the correlations between information to create metadata. What do I need to do first?
(Multiple Choice)
4.8/5
(36)
S. Department of Defense developed the Trusted Computer System Evaluation Criteria (TCSEC) to evaluate operating systems, applications, and different other products. What is not one of the four criteria topics in the book?
(Multiple Choice)
4.8/5
(33)
Environmental risks are always at hand and human behavior is unpredictable. What is usually the first line of defense?
(Multiple Choice)
4.8/5
(32)
In Peggy's office, all users have a security clearance to access information, but don't necessarily need to know all the information processed on the system. Why type of security mode is this?
(Multiple Choice)
4.8/5
(37)
Darrell and Ken are in an argument. Darrell believes algorithms should be publically known, while Ken believes algorithms should be kept secret. What is being argued?
(Multiple Choice)
4.8/5
(38)
John is creating an encryption by replacing every third letter of the alphabet by the fifth letter to its left. Sally, an expert at encryption, immediately notices the pattern and suggests for John to use random values. What would John use to do this?
(Multiple Choice)
4.9/5
(28)
What type of access control uses a private key to encrypt a hash value?
(Multiple Choice)
4.8/5
(40)
Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. Which algorithm is the most efficient, is mathematically rich, and uses the least resources?
(Multiple Choice)
4.7/5
(34)
Databases are built with programming languages. Which item is not a database language?
(Multiple Choice)
4.8/5
(40)
What type of security model separates data into one subset that needs to be highly protected and another subset that does not require a high level of protection?
(Multiple Choice)
4.9/5
(40)
Showing 21 - 40 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)