Information Security

31. A security engineer is soliciting bids for a software product that will perform centralized authentication. The engineer has found two products so far: one that is based on LDAP and one that is based on TACACS. Which of the following statements is the best approach?

  1. Select the LDAP-based product
  2. Do not consider the TACACS-based product, consider the LDAP- based product, and continue looking for other products
  3. Select the TACACS-based product
  4. Consider the TACACS-based product, and continue looking for other products based on TACACS

Correct answer: (B)
Do not consider the TACACS-based product, consider the LDAP- based product, and continue looking for other products

32. A security incident as defined as:

  1. Unauthorized entry
  2. Exposure of sensitive information
  3. Theft of sensitive information
  4. Violation of security policy

Correct answer: (D)
Violation of security policy

33. A security manager has been asked to investigate employee behavior on the part of a senior manager. The investigation has shown that the subject has suffered a serious lapse in judgment and has violated the organization's code of conduct. The security manager has been asked to keep the results of the investigation a secret. How should the security manager respond?

  1. Leak the results of the investigation to the media
  2. Cover up the results of the investigation
  3. Deliver the results of the investigation and recommendations for next steps to his superiors
  4. Notify law enforcement

Correct answer: (C)
Deliver the results of the investigation and recommendations for next steps to his superiors

34. A security manager has discovered that sensitive information stored on a server has been compromised. The organization is required by law to notify law enforcement. What should the security manager do first to preserve evidence on the server:

  1. Disconnect power to the server
  2. Back up the server
  3. Shut down the server
  4. Activate debug mode

Correct answer: (A)
Disconnect power to the server

35. A security manager has instructed a system administrator to wipe files on a hard disk. This means that the administrator needs to:

  1. Perform a low-level format on the hard disk
  2. Use a degausser to re-align the magnetic storage material on the hard disk
  3. Use a tool to overwrite files multiple times
  4. Perform a high-level format on the hard disk

Correct answer: (C)
Use a tool to overwrite files multiple times

36. A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility. What measure can be used to prevent this?

  1. Implement PIN pads at card reader stations
  2. Implement video surveillance at card reader stations
  3. Implement man traps at card reader stations
  4. Implement RFID sensors at card reader stations

Correct answer: (A)
Implement PIN pads at card reader stations

37. A security manager is developing a data classification policy. What elements need to be in the policy?

  1. Sensitivity levels, marking procedures, access procedures, and handling procedures
  2. Labeling procedures, access procedures, and handling procedures
  3. Sensitivity levels, access procedures, and handling procedures
  4. Sensitivity levels and handling procedures

Correct answer: (A)
Sensitivity levels, marking procedures, access procedures, and handling procedures

38. A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to determine the quantitative loss for a single loss based on a particular threat. The correct way to calculate this is:

  1. Divide the asset's value by the exposure factor
  2. Multiply the asset's value times the annualized rate of occurrence
  3. Multiply the asset's value times the single loss expectancy
  4. Multiply the asset's value times the exposure factor

Correct answer: (D)
Multiply the asset's value times the exposure factor

39. A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to estimate the yearly loss based on a particular threat. The correct way to calculate this is:

  1. Multiply the single loss expectancy times the asset's value
  2. Multiply the asset's value times the exposure factor
  3. Multiply the asset's value times the exposure factor times the single loss expectancy
  4. Multiply the single loss expectancy times the annualized rate of occurrence

Correct answer: (D)
Multiply the single loss expectancy times the annualized rate of occurrence

40. A security manager is searching for an encryption algorithm to be used to encrypt data files containing sensitive information. Which of the following algorithms should NOT be considered:

  1. FISH
  2. Twofish
  3. Blowfish
  4. CAST

Correct answer: (A)
FISH

Page 4 of 25