P/E 2 Flashcards
- What law protects the privacy rights of students?
A. HIPAA
B. SOX
C. GLBA
D. FERPA
Answer: D
The Family Educational Rights and Privacy Act (FERPA) protects the rights of students and the parents of minor students.
- Which electronic mail security program is based on building a web of trust?
A. PGP
B. S/MIME
C. MOSS
D. PEM
Answer: A
Phil Zimmerman’s Pretty Good Privacy (PGP) package relies on the construction of a web of trust between system users.
- ___________________ is an attack in which you receive unwanted, inappropriate, or irrelevant email messages.
A. Spamming
B. Impersonation
C. Masquerading
D. Spoofing
Answer: A
Spamming is an attack in which you receive unwanted, inappropriate, or irrelevant email messages.
- In what scenario would you perform bulk transfers of backup data to a secure offsite location?
A. Incremental backup
B. Differential backup
C. Full backup
D. Electronic vaulting
Answer: D
Electronic vaulting describes the transfer of backup data to a remote backup site in a bulk-transfer fashion.
- Which one of the following is not a major asset category normally covered by the BCP (business continuity plan)?
A. People
B. Documentation
C. Infrastructure
D. Building/facilities
Answer: B
The BCP normally covers three major asset categories: people, infrastructure, and buildings/facilities.
- David ran an nmap scan against a server and determined that port 443 is open on the server. What tool would likely provide him the best additional information about the server’s purpose and the identity of the server’s operator?
A. ssh
B. Web browser
C. telnet
D. Ping
Answer: B
The server is likely running a secure website on port 443. Using a web browser to access the site may provide important information about the site’s purpose.
- What type of intellectual property protection is best suited for computer software?
A. Copyright
B. Trademark
C. Patent
D. Trade secret
Answer: D
Trade secrets are one of the best legal protections for computer software.
8. What is the value of the logical operation shown here? X: 0 1 1 0 1 0 Y: 0 0 1 1 0 1 \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ X ⨁ Y: ?
A. 0 1 1 1 1 1
B. 0 1 0 1 1 1
C. 0 0 1 0 0 0
D. 1 0 0 0 0 0
Answer: B
The ⨁ symbol represents the exclusive OR (XOR) function, which is true when one and only one of the input bits is true.
- John found a vulnerability in his code where an attacker can enter too much input and then force the system running the code to execute arbitrary commands. What type of vulnerability has John discovered?
A. TOCTTOU
B. Buffer overflow
C. XSS
D. XSRF
Answer: B
Buffer overflow vulnerabilities exist when a developer does not properly validate user input to ensure that it is of an appropriate size. Input that is too large can “overflow” a data structure to affect other data stored in the computer’s memory.
- Which one of the following is also known as the Caesar cipher?
A. ROT2
B. ROT3
C. ROT8
D. ROT11
Answer: B
The Caesar cipher, also known as the ROT3 cipher, shifts all characters in the plain text three letters to the right to create the cipher text.
- What Japanese cipher system was broken by the United States during World War II?
A. Ultra
B. Purple
C. Enigma
D. VENONA
Answer: B
The Japanese Purple cipher system was broken by the Allies and contributed to their victory in World War II. Ultra was the effort to break the German Enigma cipher system. VENONA was an American effort to break a Soviet cipher during the 1940s.
- What is the output value of the mathematical function 19 mod 4?
A. 3
B. 4
C. 5
D. 6
Answer: A
Nineteen divided by 4 equals 4, with a remainder value of 3.
- When a user is attempting to connect to a SNMP service on an internal system that while booted and functioning is not actually running an SNMP server, what information response will their system receive?
A. UDP error
B. TCP RST
C. ICMP Type 3
D. DNS lookup error
Answer: C
SNMP is a UDP-based service. UDP does not have any means of sending back errors, because it is a simplex protocol. Thus, when UDP errors occur, the system will switch protocols and use ICMP to send back information. In the case of a non-existing service, the port is thus not available, so an ICMP Type 3 error will be returned.
- Matthew receives a digitally signed message from Christopher. What key should Matthew use to verify the digital signature?
A. Christopher’s public key
B. Christopher’s private key
C. Matthew’s public key
D. Matthew’s private key
Answer: A
Matthew uses Christopher’s public key to verify the digital signature on the message.
- What kind of recovery facility enables an organization to resume operations as quickly as possible, if not immediately upon failure of the primary facility?
A. Hot site
B. Warm site
C. Cold site
D. All of the above
Answer: A
Hot sites provide backup facilities maintained in constant working order and fully capable of taking over business operations.
- In which phase of the business impact assessment do you compute loss expectancies?
A. Risk assessment
B. Likelihood assessment
C. Impact assessment
D. Resource prioritization
Answer: C
Loss expectancies are a measure of impact and are calculated during the impact assessment phase.
- What type of virus always loads itself automatically when the system starts?
A. MBR virus
B. File infector virus
C. Stealth virus
D. Polymorphic virus
Answer: A
Master boot record (MBR) viruses infect the system’s boot sector and load when the system is started.
- What government agency is responsible for developing standards and guidelines for federal computer systems?
A. NIST
B. CIA
C. FBI
D. NSA
Answer: A
The National Institute of Standards and Technology (NIST) is responsible for developing standards and guidelines for federal computer systems. They may draw on the technical expertise of the National Security Agency for assistance.
- Who administers the European Union safe harbor provisions in the United States?
A. Department of State
B. Department of Education
C. Department of Commerce
D. Department of Defense
Answer: C
The Department of Commerce maintains the EU safe harbor provisions for American companies.
- The ____________ data model has data stored in more than one database, but the data is still logically connected. The user perceives the database as a single entity, even though it comprises numerous parts interconnected over a network.
A. Hierarchical
B. Normalized
C. Distributed
D. Relational
Answer: C
The distributed data model has data stored in more than one database, but the data is still logically connected. The user perceives the database as a single entity, even though it comprises numerous parts interconnected over a network.
- When someone launches a typical software product, such as a web browser or a text editor, it is executed in what mode of operation managed by the OS?
A. Privileged mode
B. User mode
C. Supervisory mode
D. Kernel mode
Answer: B
User mode is the basic mode used by the CPU when executing user applications. In this mode, the CPU allows the execution of only a portion of its full instruction set. This is designed to protect users from accidentally damaging the system through the execution of poorly designed code or the unintentional misuse of that code.
- What is qualitative risk analysis based on?
A. Dollar values
B. Concrete percentages
C. Historical logs and records
D. Opinions
Answer: D
The process of performing qualitative risk analysis involves judgment, intuition, and experience—in other words, opinions.
- Which of the following is not a requirement for the use of a one-time pad?
A. The encryption key must be at least one-half the length of the message to be encrypted.
B. The encryption key must be randomly generated.
C. Each one-time pad must be used only once.
D. The one-time pad must be physically protected against disclosure.
Answer: A
The encryption key must be at least as long as the message to be encrypted. This is because each key element is used to encode only one character of the message. The three other facts listed are all characteristics of one-time pad systems.
- An organization wants to ensure that users can run only specific applications. Which of the following techniques is the best choice to support this goal?
A. Whitelisting
B. Blacklisting
C. Sampling
D. Watermarking
Answer: A
Whitelisting allows administrators to specify a list of authorized applications. Any applications not on the list cannot run. Blacklisting is a list of unauthorized applications. Sampling is a form of data reduction and not related to running applications. Watermarking embeds an image or other mark on printed documents and files and helps prevent data loss.