Information Security
111. CIA is known as:
- Confidentiality, Integrity, and Availability
- Computers, Information, and Assets
- Confidence In Applications
- Controls, Integrity, and Availability
Correct answer: (A)
Confidentiality, Integrity, and Availability
112. Common biometric solutions that are suitable for building entrance control include:
- Voice print and gait
- Retina scan and hand print
- Voice print and DNA
- Fingerprint and hand print
Correct answer: (D)
Fingerprint and hand print
113. Controls to detect threats to equipment include:
- Temperature sensors, humidity sensors, and water detectors
- Temperature sensors, humidity sensors, and smoke detectors
- Temperature sensors, humidity sensors, water detectors, gas detectors, and smoke detectors
- Temperature sensors, humidity sensors, water detectors, and smoke detectors
Correct answer: (D)
Temperature sensors, humidity sensors, water detectors, and smoke detectors
114. Digital subscriber line (DSL) service:
- Utilizes existing cable service and communicates on a different frequency
- Has been superseded by ISDN
- Has been superseded by satellite communications
- Utilizes existing telephone services and communicates on a different frequency
Correct answer: (D)
Utilizes existing telephone services and communicates on a different frequency
115. DoD Information Assurance Certification and Accreditation Process (DIACAP):
- Has been superseded by the Common Criteria
- Is the process by which all U.S. federal information systems are certified and accredited
- Has been superseded by DITSCAP (Department of Defense Information Technology Security Certification and Accreditation Process)
- Is the process used to certify and accredit U.S. military information systems
Correct answer: (D)
Is the process used to certify and accredit U.S. military information systems
116. Examples of TCP/IP link layer technologies include:
- FTP, TELNET, DNS, HTTP, SMTP
- IP, IPsec
- TCP, UDP, ICMP
- Ethernet, ATM, Frame Relay, Wi-Fi
Correct answer: (D)
Ethernet, ATM, Frame Relay, Wi-Fi
117. Exposure factor is defined as:
- The part of an asset's value that is likely to be lost by a particular threat
- The probability that the threat will be realized
- The probability that a loss will occur in a year's time
- The cost of a single loss
Correct answer: (A)
The part of an asset's value that is likely to be lost by a particular threat
118. For the purpose of business continuity and disaster recovery planning, the definition of a "disaster" is:
- Any event that impairs the ability of an organization to continue operating
- Any natural event that impairs the ability of an organization to continue operating
- Any man-made event that impairs the ability of an organization to continue operating
- Any event that impairs the ability of an organization's IT systems to continue operating
Correct answer: (A)
Any event that impairs the ability of an organization to continue operating
119. How many Class C networks can be created in a Class B network:
- 254
- 1024
- 16535
- 16534
120. In an electronic codebook (ECB) cipher, each block of ciphertext:
- Is used to encrypt the next block
- Is used to encrypt the previous block
- Is used to decrypt the next block
- Is not used to encrypt the next block
Correct answer: (D)
Is not used to encrypt the next block