Information Security

131. Public key cryptography is another name for:

  1. Secure Sockets Layer
  2. Asymmetric cryptography
  3. Symmetric key cryptography
  4. Kerberos

Correct answer: (B)
Asymmetric cryptography

132. Public key cryptography is so-named because:

  1. It is the world standard for HTTPS
  2. It works on all popular computer operating systems
  3. It uses an encryption key that can be released to the public
  4. The encryption algorithms reside in the public domain

Correct answer: (C)
It uses an encryption key that can be released to the public

133. Rootkits can be difficult to detect because:

  1. They are encrypted
  2. They are polymorphic
  3. They reside in ROM instead of the hard drive
  4. They use techniques to hide themselves

Correct answer: (D)
They use techniques to hide themselves

134. Signs, guards, guard dogs, and visible notices are examples of:

  1. Administrative controls
  2. Preventive controls
  3. Deterrent controls
  4. Detective controls

Correct answer: (C)
Deterrent controls

135. Someone is sending ICMP echo requests to a network's broadcast address. What is this person doing?

  1. Pinging the default gateway
  2. Pinging the router
  3. Conducting a Ping of Death attack
  4. Conducting a Smurf attack

Correct answer: (D)
Conducting a Smurf attack

136. The (ISC)² code of ethics includes all of the following EXCEPT:

  1. Provide diligent and competent service to principals
  2. Protect society and the infrastructure
  3. Act honorably, honestly, justly, responsibly, and legally
  4. Advance and protect the profession

Correct answer: (B)
Protect society and the infrastructure

137. The activity that is concerned with the continuation of business operations is:

  1. Emergency Response Procedures
  2. Disaster Recovery Planning
  3. Business Continuity Planning
  4. Business Impact Analysis

Correct answer: (C)
Business Continuity Planning

138. The Advanced Encryption Standard is another name for which cipher:

  1. Digital Encryption Algorithm (DEA)
  2. 3DES
  3. Rijndael
  4. International Data Encryption Algorithm (IDEA)

Correct answer: (C)
Rijndael

139. The advantage of a gaseous fire suppression system is:

  1. It works by displacing oxygen in the room
  2. It is hazardous to humans
  3. It will not damage computing equipment
  4. It is less expensive than sprinklers

Correct answer: (C)
It will not damage computing equipment

140. The allegation that an employee has violated company policy by downloading child pornography onto a company workstation should result in:

  1. Notification of affected customers
  2. Termination of the employee
  3. The declaration of a security incident
  4. A forensic investigation and possible disciplinary action

Correct answer: (D)
A forensic investigation and possible disciplinary action

Page 14 of 25