Information Security

111. CIA is known as:

  1. Confidentiality, Integrity, and Availability
  2. Computers, Information, and Assets
  3. Confidence In Applications
  4. Controls, Integrity, and Availability

Correct answer: (A)
Confidentiality, Integrity, and Availability

112. Common biometric solutions that are suitable for building entrance control include:

  1. Voice print and gait
  2. Retina scan and hand print
  3. Voice print and DNA
  4. Fingerprint and hand print

Correct answer: (D)
Fingerprint and hand print

113. Controls to detect threats to equipment include:

  1. Temperature sensors, humidity sensors, and water detectors
  2. Temperature sensors, humidity sensors, and smoke detectors
  3. Temperature sensors, humidity sensors, water detectors, gas detectors, and smoke detectors
  4. Temperature sensors, humidity sensors, water detectors, and smoke detectors

Correct answer: (D)
Temperature sensors, humidity sensors, water detectors, and smoke detectors

114. Digital subscriber line (DSL) service:

  1. Utilizes existing cable service and communicates on a different frequency
  2. Has been superseded by ISDN
  3. Has been superseded by satellite communications
  4. Utilizes existing telephone services and communicates on a different frequency

Correct answer: (D)
Utilizes existing telephone services and communicates on a different frequency

115. DoD Information Assurance Certification and Accreditation Process (DIACAP):

  1. Has been superseded by the Common Criteria
  2. Is the process by which all U.S. federal information systems are certified and accredited
  3. Has been superseded by DITSCAP (Department of Defense Information Technology Security Certification and Accreditation Process)
  4. Is the process used to certify and accredit U.S. military information systems

Correct answer: (D)
Is the process used to certify and accredit U.S. military information systems

116. Examples of TCP/IP link layer technologies include:

  1. FTP, TELNET, DNS, HTTP, SMTP
  2. IP, IPsec
  3. TCP, UDP, ICMP
  4. Ethernet, ATM, Frame Relay, Wi-Fi

Correct answer: (D)
Ethernet, ATM, Frame Relay, Wi-Fi

117. Exposure factor is defined as:

  1. The part of an asset's value that is likely to be lost by a particular threat
  2. The probability that the threat will be realized
  3. The probability that a loss will occur in a year's time
  4. The cost of a single loss

Correct answer: (A)
The part of an asset's value that is likely to be lost by a particular threat

118. For the purpose of business continuity and disaster recovery planning, the definition of a "disaster" is:

  1. Any event that impairs the ability of an organization to continue operating
  2. Any natural event that impairs the ability of an organization to continue operating
  3. Any man-made event that impairs the ability of an organization to continue operating
  4. Any event that impairs the ability of an organization's IT systems to continue operating

Correct answer: (A)
Any event that impairs the ability of an organization to continue operating

119. How many Class C networks can be created in a Class B network:

  1. 254
  2. 1024
  3. 16535
  4. 16534

Correct answer: (A)
254

120. In an electronic codebook (ECB) cipher, each block of ciphertext:

  1. Is used to encrypt the next block
  2. Is used to encrypt the previous block
  3. Is used to decrypt the next block
  4. Is not used to encrypt the next block

Correct answer: (D)
Is not used to encrypt the next block

Page 12 of 25