Information Security
131. Public key cryptography is another name for:
- Secure Sockets Layer
- Asymmetric cryptography
- Symmetric key cryptography
- Kerberos
Correct answer: (B)
Asymmetric cryptography
132. Public key cryptography is so-named because:
- It is the world standard for HTTPS
- It works on all popular computer operating systems
- It uses an encryption key that can be released to the public
- The encryption algorithms reside in the public domain
Correct answer: (C)
It uses an encryption key that can be released to the public
133. Rootkits can be difficult to detect because:
- They are encrypted
- They are polymorphic
- They reside in ROM instead of the hard drive
- They use techniques to hide themselves
Correct answer: (D)
They use techniques to hide themselves
134. Signs, guards, guard dogs, and visible notices are examples of:
- Administrative controls
- Preventive controls
- Deterrent controls
- Detective controls
Correct answer: (C)
Deterrent controls
135. Someone is sending ICMP echo requests to a network's broadcast address. What is this person doing?
- Pinging the default gateway
- Pinging the router
- Conducting a Ping of Death attack
- Conducting a Smurf attack
Correct answer: (D)
Conducting a Smurf attack
136. The (ISC)² code of ethics includes all of the following EXCEPT:
- Provide diligent and competent service to principals
- Protect society and the infrastructure
- Act honorably, honestly, justly, responsibly, and legally
- Advance and protect the profession
Correct answer: (B)
Protect society and the infrastructure
137. The activity that is concerned with the continuation of business operations is:
- Emergency Response Procedures
- Disaster Recovery Planning
- Business Continuity Planning
- Business Impact Analysis
Correct answer: (C)
Business Continuity Planning
138. The Advanced Encryption Standard is another name for which cipher:
- Digital Encryption Algorithm (DEA)
- 3DES
- Rijndael
- International Data Encryption Algorithm (IDEA)
Correct answer: (C)
Rijndael
139. The advantage of a gaseous fire suppression system is:
- It works by displacing oxygen in the room
- It is hazardous to humans
- It will not damage computing equipment
- It is less expensive than sprinklers
Correct answer: (C)
It will not damage computing equipment
140. The allegation that an employee has violated company policy by downloading child pornography onto a company workstation should result in:
- Notification of affected customers
- Termination of the employee
- The declaration of a security incident
- A forensic investigation and possible disciplinary action
Correct answer: (D)
A forensic investigation and possible disciplinary action