CBKR Flashcards
(97 cards)
- Copyright provides what form of protection:
A. Protects an author’s right to distribute his/her works.
B. Protects information that provides a competitive advantage.
C. Protects the right of an author to prevent unauthorized use of his/her works.
D. Protects the right of an author to prevent viewing of his/her works.
C. Protects the right of an author to prevent unauthorized use of his/her works.
- Which of the following describes the first step in establishing an encrypted session
using a Data Encryption Standard (DES) key?
A. Key clustering
B. Key compression
C. Key signing
D. Key exchange
D. Key exchange
- A CISSP may face with an ethical conflict between their company’s policies and the (ISC)2 Code of Ethics. According to the (ISC)2 Code of Ethics, in which order of
priority should ethical conflicts be resolved?
A. Duty to principals, profession, public safety, and individuals.
B. Duty to public safety, principals, individuals, and profession.
C. Duty to profession, public safety, individuals, and principals.
D. Duty to public safety, profession, individuals, and principals.
B. Duty to public safety, principals, individuals, and profession.
11. Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to? A. Discretionary Access Control B. Task-initiated Access Control C. Subject-dependent Access Control D. Token-oriented Access Control
A. Discretionary Access Control
12. In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by: A. Protection Profile. B. Target of Evaluation. C. Evaluation Assurance Level 3. D. Evaluation Assurance Level 7.
A. Protection Profile.
- Configuration management provides assurance that changes…?
A. to application software cannot bypass system security features.
B. do not adversely affect implementation of the security policy.
C. to the operating system are always subjected to independent validation and verification.
D. in technical documentation maintain an accurate description of the Trusted Computer Base.
B. do not adversely(不利地) affect implementation of the security policy.
- All of the following methods ensure the stored data are unreadable except…?
A. writing random data over the old file.
B. physical alteration of media.
C. degaussing the disk or tape.
D. removing the volume header information.
D. removing the volume header information.
- What determines the assignment of data classifications in a mandatory access control
(MAC) philosophy?
A. The analysis of the users in conjunction with the audit department
B. The assessment by the information security department
C. The user’s evaluation of a particular information element
D. The organization’s published security policy for data classification
D. The organization’s published security policy for data classification
- Which of the following is the primary goal of a security awareness program?
A. It provides a vehicle for communicating security procedures.
B. It provides a clear understanding of potential risk and exposure.
C. It provides a forum for disclosing exposure and risk analysis.
D. It provides a forum to communicate user responsibilities.
B. It provides a clear understanding of potential risk and exposure. # A:它提供了一種傳達安全程序的工具。 B.它提供了對潛在風險和暴露的清晰了解。 C.它提供了一個公開暴露和風險分析的論壇。 D.它提供了一個交流用戶責任的論壇。
- Which of the following evidence collection method is most likely accepted in a court case?
A. Provide a full system backup inventory.
B. Create a file-level archive of all files.
C. Provide a mirror image of the hard drive.
D. Copy all files accessed at the time of the incident.
C. Provide a mirror image of the hard drive.
- Which of the following characteristics is not of a good stream cipher?
A. Long periods of no repeating patterns.
B. Statistically predictable.
C. Keystream is not linearly related to the key.
D. Statistically unbiased keystream.
B. Statistically predictable.
- When a security administrator wants to conduct regular test on the strength of user passwords, what may be the best setup for this test?
A. A networked laptop with Rainbow table that have direct access to the live password database.
B. A standalone workstation with Rainbow table and a copied password database.
C. A networked workstation with Rainbow table and a copied password database.
D. This is not possible, because the password database is encrypted.
B. A standalone workstation with Rainbow table and a copied password database.
- Which answer lists the proper steps required to develop a disaster recovery and business continuity plan (DRP/BCP)?
A. Project initiation, business impact analysis, strategy development, plan development, testing, maintenance.
B. Strategy development, project initiation, business impact analysis, plan development, testing, maintenance.
C. Business impact analysis, project initiation, strategy development, plan development, testing, maintenance.
D. Project initiation, plan development, business impact analysis, strategy development, testing, maintenance.
A. Project initiation, business impact analysis, strategy development, plan development, testing, maintenance.
- An information security program should include the following elements:
A. Disaster recovery and business continuity planning, and definition of access control requirements and human resources policies.
B. Business impact, threat and vulnerability analysis, delivery of an information security awareness program, and physical security of key installations.
C. Security policy implementation, assignment of roles and responsibilities, and information asset classification.
D. Senior management organizational structure, message distribution standards, and procedures for the operation of security management systems.
C. Security policy implementation, assignment of roles and responsibilities, and information asset classification.
- Security of an automated information system is most effective and economical if the system is…?
A. optimized prior to addition of security.
B. customized to meet the specific security threat.
C. subjected to intense security testing.
D. designed originally to meet the information protection needs.
D. designed originally to meet the information protection needs.
- It is important that information about an ongoing computer crime investigation be…?
A. destroyed as soon after trial as possible.
B. reviewed by upper management before being released.
C. replicated to a backup system to ensure availability.
D. limited to as few people as possible.
D. limited to as few people as possible.
- Which answer is not true for Diffie-Hellman algorithm?
A. Security stems from the difficulty of calculating the product of two large prime numbers.
B. It was the first public key exchange algorithm.
C. It is vulnerable to man-in-the-middle attacks.
D. It is used for distribution of a shared key, not for message encryption and decryption.
A. Security stems from the difficulty of calculating the product of two large prime numbers.
- After signing out a laptop computer from the company loaner pool, you discovered there is a memorandum stored in the loaner laptop written to a competitor containing sensitive information about a new product your company is about to release. Based on the (ISC)2 Code of Ethics, what is the first action you should take?
A. Delete the memorandum from the laptop to ensure no one else will see it.
B. Contact the author of the memorandum to let him/her know the memorandum was on the laptop.
C. Immediately inform your company’s management of your findings and its potential ramifications.
D. Inform the security awareness trainers that data disclosure prevention in a mobile computing environment needs to be added to their classes.
C. Immediately inform your company’s management of your findings and its potential ramifications.
44. What is the trusted registry that guarantees the authenticity of client and server public keys? A. Public key notary. B. Certification authority. C. Key distribution center. D. Key revocation certificate.
B. Certification authority.
45. The concept that all accesses must be mediated, protected from unauthorized modification, and verifiable as correct is implemented through what? A. A security model. B. A reference monitor. C. A security kernel. D. A trusted computing base.
C. A security kernel.
- During a disaster or emergency, how does a closed-circuit television (CCTV) help management and security to minimize loss?
A. It helps the management to direct resources to the hardest hit area.
B. It records instances of looting and other criminal activities.
C. It documents shortcomings of plans and procedures.
D. It captures the exposure of assets to physical risk.
A. It helps the management to direct resources to the hardest hit area.
- The goal of cryptanalysis is to…?
A. forge coded signals that will be accepted as authentic.
B. ensure that the key has no repeating segments.
C. reduce the system overhead for cryptographic functions.
D. determine the number of encryption permutations required.
A. forge coded signals that will be accepted as authentic.
- Which one of the followings cannot be identified by a business impact analysis (BIA)?
A. Analyzing the threats associated with each functional area.
B. Determining risks associated with threats.
C. Identifying major functional areas of information.
D. Determining team members associated with disaster planning.
D. Determining team members associated with disaster planning.
- Pretty Good Privacy (PGP) provides…?
A. confidentiality, integrity, and authenticity.
B. integrity, availability, and authentication.
C. availability, authentication, and non-repudiation.
D. authorization, non-repudiation, and confidentiality.
D. authorization, non-repudiation, and confidentiality.