Information Security

151. The encryption mode where ciphertext output from each encrypted plaintext block in the encryption used for the next block is known as:

  1. Cipher feedback
  2. Output feedback
  3. Cipher block chaining
  4. Electronic codebook

Correct answer: (C)
Cipher block chaining

152. The first priority for disaster response should be:

  1. Backup media
  2. Paper records
  3. Personnel safety
  4. Remote access

Correct answer: (C)
Personnel safety

153. The following are characteristics of a computer virus EXCEPT:

  1. Polymorphic
  2. Downloadable
  3. Self-propagating
  4. Embedded in spam

Correct answer: (C)
Self-propagating

154. The following are valid reasons to reduce the level of privilege for workstation users EXCEPT:

  1. Decreased support costs because users are unable to change system configurations
  2. Decreased need for whole disk encryption
  3. Decreased impact from malware
  4. Increased security because users are unable to tamper with security controls

Correct answer: (B)
Decreased need for whole disk encryption

155. The greatest risk related to a cutover test is:

  1. If backup servers do not function correctly, the test will fail
  2. A cutover test tests only the live load and not the switchover
  3. A cutover test tests only the switchover and not the live load
  4. If backup servers do not function correctly, critical business processes may fail

Correct answer: (D)
If backup servers do not function correctly, critical business processes may fail

156. The impact of a specific threat is defined as:

  1. The cost of recovering the asset
  2. The cost required to protect the related asset
  3. The effect of the threat if it is realized
  4. The loss of revenue if it is realized

Correct answer: (C)
The effect of the threat if it is realized

157. The information security officer in an organization has assigned various accounting department employees to various roles in the organization's financial system, taking care to assign roles with the fewest possible functions. Roles have been assigned according to the principle of:

  1. Need to know
  2. Segregation of duties
  3. Split custody
  4. Least privilege

Correct answer: (D)
Least privilege

158. The innermost portion of an operating system is known as:

  1. Kernel
  2. Core
  3. Ring 0
  4. Process 0

Correct answer: (A)
Kernel

159. The instructions contained with an object are known as its:

  1. Class
  2. Firmware
  3. Code
  4. Method

Correct answer: (D)
Method

160. The layers in the OSI model are:

  1. Link, internet transport, session, application
  2. Link, internet, transport, application
  3. Physical, data link, network, transport, session, presentation, application
  4. Physical, network transport, session, application

Correct answer: (C)
Physical, data link, network, transport, session, presentation, application

Page 16 of 25