61. All of the following are advantages of using self-signed SSL certificates EXCEPT:
Correct answer: (A)
Server authentication
62. All of the following are valid reasons for backing up data EXCEPT:
Correct answer: (C)
Replication
63. All of the following methods for destroying data on hard disk drives are sufficient EXCEPT:
Correct answer: (A)
Reformatting
64. All of the following statements about a security incident plan are correct EXCEPT:
Correct answer: (C)
The plan should be published annually
65. All of the following statements about the OSI network model are true EXCEPT:
Correct answer: (C)
TCP/IP is an implementation of the OSI network model
66. All of the following statements about the polyalphabetic cipher are true EXCEPT:
Correct answer: (A)
It is a form of one-time pad
67. All of the following statements about the TCP protocol are true EXCEPT:
Correct answer: (B)
Connectionless
68. An application has been certified against established evaluation criteria. This means:
Correct answer: (C)
Formal management approval is required before it can be used
69. An attack on a DNS server to implant forged "A" records is characteristic of a:
Correct answer: (A)
Pharming attack
70. An attacker is attempting to learn the encryption key that is used to protect messages being sent between two parties. The attacker is able to create his own messages, get them encrypted by one of the parties, and can then examine the ciphertext for his message. This type of attack is known as:
Correct answer: (C)
Chosen plaintext attack