Information Security
141. The best defense against a NOP sled attack is:
- Firewall
- Anti-virus
- The strcpy() function
- Input boundary checking
Correct answer: (D)
Input boundary checking
142. The best time to introduce security into an application is:
- Implementation
- Design
- Development
- Testing
Correct answer: (B)
Design
143. The categories of controls are:
- Detective, deterrent, preventive, corrective, recovery, and compensating
- Detective, preventive, and deterrent
- Technical, logical, and physical
- Detective, preventive, recovery, and compensating
Correct answer: (A)
Detective, deterrent, preventive, corrective, recovery, and compensating
144. The categories of laws in the U.S. are:
- Civil, criminal, administrative, and family
- Intellectual, privacy, and computer crime
- Criminal, civil, and administrative
- Criminal, civil, and family
Correct answer: (C)
Criminal, civil, and administrative
145. The Common Criteria supersedes which evaluation frameworks:
- Neither TCSEC nor ITSEC
- ITSEC
- TCSEC and ITSEC
- TCSEC
Correct answer: (C)
TCSEC and ITSEC
146. The component in a computer used for long-term storage is called:
- Secondary storage
- Main storage
- Virtual memory
- File system
Correct answer: (A)
Secondary storage
147. The component in a computer where program instructions are executed is called the:
- CPU
- Bus
- Front-side bus
- Firmware
148. The Data Encryption Standard:
- Is used by Secure Sockets Layer (SSL) encryption
- Has been replaced by the International Data Encryption Algorithm (IDEA)
- Uses a 64-bit encryption key
- Uses a 56-bit encryption key
Correct answer: (D)
Uses a 56-bit encryption key
149. The definition of Recovery Point Objective (RPO) is:
- The location of the recovery site
- The maximum amount of downtime
- The method used to recover backup data
- The maximum amount of data loss
Correct answer: (D)
The maximum amount of data loss
150. The definition of Recovery Time Objective (RTO) is:
- The location of the recovery site
- The maximum amount of downtime
- The method used to recover backup data
- The maximum amount of data loss
Correct answer: (B)
The maximum amount of downtime