Information Security

171. The primary impact of a pandemic on an organization is:

  1. Significant disruptions of public utilities
  2. Significant disruptions of transportation systems
  3. Large numbers of casualties that reduce the demand for services
  4. Long periods of employee absenteeism that impact the organization's ability to provide services

Correct answer: (D)
Long periods of employee absenteeism that impact the organization's ability to provide services

172. The primary purpose of a firewall is:

  1. To protect a server from malicious traffic
  2. To block malicious code
  3. To control traffic between networks
  4. To create a DMZ network

Correct answer: (C)
To control traffic between networks

173. The primary reason for classifying disasters as natural or man-made is:

  1. To correctly determine their probable impact
  2. To correctly determine their probability of occurrence
  3. To classify different types of events to better understand them
  4. To determine which contingency plans need to be carried out

Correct answer: (C)
To classify different types of events to better understand them

174. The primary reason why users are told to use strong passwords is NOT:

  1. It is more difficult to "shoulder surf" a strong password because of the additional keystrokes
  2. Strong passwords are more difficult for others to guess
  3. Weak passwords are susceptible to dictionary attacks
  4. Passwords based on easily-discovered facts such as birthdays, spouse and pet names are easily guessed

Correct answer: (A)
It is more difficult to "shoulder surf" a strong password because of the additional keystrokes

175. The process of erasing magnetic media through the use of a strong magnetic field is known as:

  1. Delousing
  2. Degaussing
  3. Shredding
  4. Wiping

Correct answer: (B)
Degaussing

176. The process of transforming ciphertext to plaintext is known as:

  1. Decryption
  2. Encryption
  3. Key recovery
  4. Hashing

Correct answer: (A)
Decryption

177. The purpose for putting a "canary" value in the stack is:

  1. To detect a dictionary attack
  2. To detect a stack smashing attack
  3. To detect parameter tampering
  4. To detect script injection

Correct answer: (B)
To detect a stack smashing attack

178. The purpose of "secure siting" is:

  1. To ensure that a site is reasonably free from natural hazards that could threaten ongoing business operations
  2. To ensure that a site is reasonably free from hazards that could threaten ongoing business operations
  3. To ensure that a site is free from all hazards that could threaten ongoing business operations
  4. To ensure that a site is free from all man-made hazards that could threaten ongoing business operations

Correct answer: (B)
To ensure that a site is reasonably free from hazards that could threaten ongoing business operations

179. The purpose of a CPU fetch operation is:

  1. To retrieve data from memory
  2. To retrieve an instruction from memory
  3. To retrieve data from the hard disk drive
  4. To retrieve data from the program counter

Correct answer: (B)
To retrieve an instruction from memory

180. The purpose of a cutover test is:

  1. To determine the ability to perform live business transactions on backup systems instead of on production systems
  2. To determine the ability for a recovery test to be interrupted
  3. To determine the ability to perform live business transactions on production systems and backup systems at the same time
  4. To determine the ability for the last minute substitution of a recovery team

Correct answer: (A)
To determine the ability to perform live business transactions on backup systems instead of on production systems

Page 18 of 25