Information Security
171. The primary impact of a pandemic on an organization is:
- Significant disruptions of public utilities
- Significant disruptions of transportation systems
- Large numbers of casualties that reduce the demand for services
- Long periods of employee absenteeism that impact the organization's ability to provide services
Correct answer: (D)
Long periods of employee absenteeism that impact the organization's ability to provide services
172. The primary purpose of a firewall is:
- To protect a server from malicious traffic
- To block malicious code
- To control traffic between networks
- To create a DMZ network
Correct answer: (C)
To control traffic between networks
173. The primary reason for classifying disasters as natural or man-made is:
- To correctly determine their probable impact
- To correctly determine their probability of occurrence
- To classify different types of events to better understand them
- To determine which contingency plans need to be carried out
Correct answer: (C)
To classify different types of events to better understand them
174. The primary reason why users are told to use strong passwords is NOT:
- It is more difficult to "shoulder surf" a strong password because of the additional keystrokes
- Strong passwords are more difficult for others to guess
- Weak passwords are susceptible to dictionary attacks
- Passwords based on easily-discovered facts such as birthdays, spouse and pet names are easily guessed
Correct answer: (A)
It is more difficult to "shoulder surf" a strong password because of the additional keystrokes
175. The process of erasing magnetic media through the use of a strong magnetic field is known as:
- Delousing
- Degaussing
- Shredding
- Wiping
Correct answer: (B)
Degaussing
176. The process of transforming ciphertext to plaintext is known as:
- Decryption
- Encryption
- Key recovery
- Hashing
Correct answer: (A)
Decryption
177. The purpose for putting a "canary" value in the stack is:
- To detect a dictionary attack
- To detect a stack smashing attack
- To detect parameter tampering
- To detect script injection
Correct answer: (B)
To detect a stack smashing attack
178. The purpose of "secure siting" is:
- To ensure that a site is reasonably free from natural hazards that could threaten ongoing business operations
- To ensure that a site is reasonably free from hazards that could threaten ongoing business operations
- To ensure that a site is free from all hazards that could threaten ongoing business operations
- To ensure that a site is free from all man-made hazards that could threaten ongoing business operations
Correct answer: (B)
To ensure that a site is reasonably free from hazards that could threaten ongoing business operations
179. The purpose of a CPU fetch operation is:
- To retrieve data from memory
- To retrieve an instruction from memory
- To retrieve data from the hard disk drive
- To retrieve data from the program counter
Correct answer: (B)
To retrieve an instruction from memory
180. The purpose of a cutover test is:
- To determine the ability to perform live business transactions on backup systems instead of on production systems
- To determine the ability for a recovery test to be interrupted
- To determine the ability to perform live business transactions on production systems and backup systems at the same time
- To determine the ability for the last minute substitution of a recovery team
Correct answer: (A)
To determine the ability to perform live business transactions on backup systems instead of on production systems