151. The encryption mode where ciphertext output from each encrypted plaintext block in the encryption used for the next block is known as:
Correct answer: (C)
Cipher block chaining
152. The first priority for disaster response should be:
Correct answer: (C)
Personnel safety
153. The following are characteristics of a computer virus EXCEPT:
Correct answer: (C)
Self-propagating
154. The following are valid reasons to reduce the level of privilege for workstation users EXCEPT:
Correct answer: (B)
Decreased need for whole disk encryption
155. The greatest risk related to a cutover test is:
Correct answer: (D)
If backup servers do not function correctly, critical business processes may fail
156. The impact of a specific threat is defined as:
Correct answer: (C)
The effect of the threat if it is realized
157. The information security officer in an organization has assigned various accounting department employees to various roles in the organization's financial system, taking care to assign roles with the fewest possible functions. Roles have been assigned according to the principle of:
Correct answer: (D)
Least privilege
158. The innermost portion of an operating system is known as:
Correct answer: (A)
Kernel
159. The instructions contained with an object are known as its:
Correct answer: (D)
Method
160. The layers in the OSI model are:
Correct answer: (C)
Physical, data link, network, transport, session, presentation, application