Information Security

1. "Please do not touch Steve's pet alligator" is:

  1. A memory aid for the names of the service types in a TCP/IP network
  2. A memory aid for the names of the layers in the OSI network model
  3. A memory aid for the names of the layers in the TCP/IP network model
  4. A memory aid for the names of the address types in an Ethernet network

Correct answer: (B)
A memory aid for the names of the layers in the OSI network model

2. "Safe languages" and "safe libraries" are so-called because:

  1. They automatically detect some forms of input attacks
  2. They automatically detect parameter tampering
  3. They automatically detect script injection
  4. They automatically detect malware attacks

Correct answer: (A)
They automatically detect some forms of input attacks

3. A biometric authentication system that incorporates the results of newer scans into a user's profile is less likely to:

  1. Have a lower False Accept Rate
  2. Reject future authentication attempts as the user's biometrics slowly change over time
  3. Correctly identify and authenticate users
  4. Reject an impostor

Correct answer: (B)
Reject future authentication attempts as the user's biometrics slowly change over time

4. A building access mechanism where only one person at a time may pass is called a:

  1. Entrance trap
  2. Step trap
  3. Mantrap
  4. Passtrap

Correct answer: (C)
Mantrap

5. A building facilities manager is overseeing the construction of a new office building for the organization. What type of cabling should be used for voice and data communication:

  1. 10BASE2 thinnet
  2. Category 6 twisted pair
  3. Category 5e twisted pair
  4. 10BASE5 thicknet

Correct answer: (B)
Category 6 twisted pair

6. A case of employee misconduct that is the subject of a forensic investigation will likely result in a court proceeding. What should included in the forensic investigation:

  1. Legible notes on all activities
  2. Law enforcement investigation
  3. Chain of custody for all evidence
  4. Dual custody for all evidence

Correct answer: (C)
Chain of custody for all evidence

7. A computer has just been rebooted. An application program has started, and the application program needs to send an FTP packet to a server at IP address 10.14.250.200. What is the first packet that the computer will send on the network to accomplish this:

  1. ARP
  2. Whois
  3. FTP
  4. Rlogin

Correct answer: (A)
ARP

8. A computer running the Windows operating system has nearly exhausted available physical memory for active processes. In order to avoid exhausting all available memory, what should the operating system begin doing?

  1. Swapping
  2. Paging
  3. Killing old processes
  4. Running the garbage collector

Correct answer: (B)
Paging

9. A computer user is listening to an audio broadcast on the Internet through an SSL VPN. The type of encryption cipher used in this case is:

  1. Block cipher
  2. Stream cipher
  3. Running key cipher
  4. Vernam cipher

Correct answer: (A)
Block cipher

10. A computing facility experiences frequent brownouts but few, if any, blackouts. What should be implemented to mitigate this condition:

  1. Line conditioner
  2. Power Conditioning Unit (PDU)
  3. Uninterruptible Power Supply (UPS)
  4. Electric generator

Correct answer: (C)
Uninterruptible Power Supply (UPS)

Page 1 of 25