Information Security

11. A database administrator (DBA) is responsible for carrying out security policy, which includes controlling which users have access to which data. The DBA has been asked to make just certain fields in some database tables visible to some new users. What is the best course of action for the DBA to take?

  1. Implement column-based access controls
  2. Export the table to a data warehouse, including only the fields that the users are permitted to see
  3. Clone the table, including only the fields that the users are permitted to see
  4. Create a view that contains only the fields that the users are permitted to see

Correct answer: (D)
Create a view that contains only the fields that the users are permitted to see

12. A defense-in-depth strategy for anti-malware is recommended because:

  1. There are many malware attack vectors
  2. Anti-virus software is often troublesome on end user workstations
  3. Malware can hide in SSL transmissions
  4. Users can defeat anti-malware on their workstations

Correct answer: (A)
There are many malware attack vectors

13. A DRP project team has determined that the RTO for a specific application shall be set to 180 minutes. Which option for a recovery system will best meet the application's recovery needs?

  1. Hot standby systems and tape recovery
  2. Server clustering and data replication
  3. Warm standby systems and tape recovery
  4. Cold site and tape recovery

Correct answer: (B)
Server clustering and data replication

14. A financial services organization is required to protect information about its customers. Which of these laws requires this protection:

  1. HIPAA
  2. COPPA
  3. CALEA
  4. GLBA

Correct answer: (D)
GLBA

15. A forensics investigator has been asked to examine the workstation used by an employee who has been known to misbehave in the past. This investigation is related to more potential misconduct. What approach should the investigator take in this new investigation?

  1. Approach this investigation objectively, without regard to the history of this employee's conduct
  2. Approach this investigation subjectively, given the history of this employee's conduct
  3. Assume the employee is guilty and search for evidence to support this
  4. Assume the employee is innocent and search for evidence to refute this

Correct answer: (A)
Approach this investigation objectively, without regard to the history of this employee's conduct

16. A hidden means of communication between two systems has been discovered. This is known as:

  1. Side channel
  2. Covert channel
  3. Steganography
  4. Bot

Correct answer: (B)
Covert channel

17. A list of all of the significant events that occur in an application is known as:

  1. Audit log
  2. Replay log
  3. Export file
  4. Data dump

Correct answer: (A)
Audit log

18. A network engineer who is examining telecommunications circuits has found one that is labeled as a DS-1. What is the maximum throughput that may be expected from this circuit?

  1. Approximately 7,000k chars/sec
  2. Approximately 56k bits/sec
  3. Approximately 170k chars/sec
  4. Approximately 1,544M bits/sec

Correct answer: (C)
Approximately 170k chars/sec

19. A network manager wishes to simplify management of all of the network devices in the organization through centralized authentication. Which of the following available authentication protocols should the network manager choose:

  1. RADIUS
  2. TACACS
  3. OSPF
  4. IPsec

Correct answer: (A)
RADIUS

20. A particular encryption algorithm transforms plaintext to ciphertext by XORing the plaintext with the encryption key. This is known as:

  1. Electronic codebook
  2. Cipher block chaining
  3. Block cipher
  4. Stream cipher

Correct answer: (D)
Stream cipher

Page 2 of 25