Practice Questions Flashcards

(18 cards)

1
Q

Which of the following most concerns protecting availability of information?

A

Running redundant servers to maintain uptime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following most concerns protecting integrity of information?

A

Employing two-person control to avoid data entry errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personally identifiable information, credit card numbers and intellectual property are examples of which of the following aspects of an Information Security risk?

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Investing in an Access Control System to restrict access to authorised individuals best exemplifies which of the following?

A

Modifying risk by reducing the likelihood of an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following most concerns the act of authorising an entity?

A

Checking an access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are examples of ‘something a supplicant has’?

A

Bank card reader and Yubikey device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following does NOT accurately specify a requirement of a useful biometric characteristic for the purposes of access control?|

A

the characteristic should be difficult to obtain/measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a principle by which modern cryptographic algorithms should abide?

A

Resistant to frequency analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are examples of symmetric cryptography?

A

DES, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

‘Hashing a message and encrypting the result with a private key’ describes which of the following operations?

A

Signature Generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT a characteristic of asymmetric encryption?

A

Typically used to encrypt a symmetric session key rather than the plaintext message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

‘The amount of money estimated to be incurred each year due to a particular incident scenario’ defines which of the following?

A

Annualized Loss Expectancy (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ceasing the business function that gives risk to a risk is an example of which of the following ?

A

Risk termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT an activity expected to be undertaken in the immediate response to an incident?

A

Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an example of Reflected (i.e., Non-Persistent) Cross-Site Scripting?

A

An attacker exploits a vulnerable search bar by entering a query containing the

 tag that executes malicious Javascript.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following accurately states a recommendation for preventing Cross Site Scripting?

A

URL escape before inserting untrusted data into HTML parameter values.

17
Q

Which of the following is the most accurate statement?

A

Since SQL databases generally hold sensitive data, loss of confidentiality is a frequent problem with SQL injection vulnerabilities.

18
Q

Which of the following accurately states an action recommended by the NCSC when securing the development environment?

A

Trust your developers, verify their actions.