Questions 0-200 Flashcards
Which part of the security policies must a user be aware of? A. The applicable policies themselves and the effect caused by security breach B. The person responsible for creating the policies. C. The total number of policies that are there. D. None of the above
Which part of the security policies must a user be aware of? A. The applicable policies themselves and the effect caused by security breach (Answer) B. The person responsible for creating the policies. C. The total number of policies that are there. D. None of the above Explanation It is very essential for every employee/user to know the relevant security policies and the effect of security breach
Which of the following is necessary even after an employee has attended a security awareness program? A. Ensure security update bulletins are distributed to all employees at regular intervals. B. Assign a test score to the employee for the training attended C. Ensure the employee goes through one more such training D. None of the above
Which of the following is necessary even after an employee has attended a security awareness program? A. Ensure security update bulletins are distributed to all employees at regular intervals. (Answer) B. Assign a test score to the employee for the training attended C. Ensure the employee goes through one more such training D. None of the above Explanation The security awareness program attended by the employee may provide security awareness up to that date only. Any improvements and up gradation in security awareness there after must reach all the staff in form of bulletins.
Which of the following will not be available on a cold site? A. Electricity B. Networking C. Space D. None of the above
Which of the following will not be available on a cold site? A. Electricity B. Networking (Answer) C. Space D. None of the above Explanation Cold site usually has electricity and space for furniture. Networking will have to be set up from scratch.
If you cannot afford a hot site- which of the following would be an alternate solution? A. Warm site B. Cold site C. Luke warm site D. None of the above
If you cannot afford a hot site- which of the following would be an alternate solution? A. Warm site (Answer) B. Cold site C. Luke warm site D. None of the above Explanation A warm site would provide all facilities other than computers. Hence the return time to business is usually more than t hat in hot site.
Which of the following backup is most time consuming to restore during a server crash? A. Differential backup B. Incremental backup C. Full backup D. None of the above
Which of the following backup is most time consuming to restore during a server crash? A. Differential backup B. Incremental backup (Answer) C. Full backup D. None of the above Explanation Incremental backups take the fastest to perform in comparison with full and differential backups- but are the longest to restore
Which of the following is an ideal location for storing the backup? A. Offsite location B. Within the main site C. In the same city as head office D. None of the above
Which of the following is an ideal location for storing the backup? A. Offsite location (Missed) B. Within the main site (Missed) C. In the same city as head office D. None of the above Explanation Any off site location is good. Within the vicinity of the site will ensure that data backup is safe in case of fire and is also available at short notice when required to restore. In general- Budget and security concerns should dictate distance- as far away location will protect against natural disasters that may effect the city/neighbrohood
Which of the following enhances the server availability on the network? Choose the best answer A. Server mirroring B. Server clustering C. PDC D. None of the above
Which of the following enhances the server availability on the network? Choose the best answer A. Server mirroring B. Server clustering (Answer) C. PDC D. None of the above Explanation Server clustering is the ideal solution for enhancing file server availability on the network
Backup is required only for electric power and not electronic data. T/F? A. True B. False
Backup is required only for electric power and not electronic data. T/F? A. True B. False (Answer) Explanation All precautions for networks are being taken to preserve network and data availability. Hence iti s mandatory that data be given maximum online and offline fault tolerance.
Surge protectors are meant to provide backup to electrical and electronic devices. T/F? A. True B. False
Surge protectors are meant to provide backup to electrical and electronic devices. T/F? A. True (Answer) B. False Explanation Surge protectors as the name suggests provides electronic devices protection against power surge
In case of fire- which o the following needs to be programmed to be put off instantly? A. Electric supply B. Air conditioner C. Fire D. None of the above
In case of fire- which o the following needs to be programmed to be put off instantly? A. Electric supply (Answer) B. Air conditioner C. Fire (Your Answer) D. None of the above Explanation Leaving the electric supply on during fire can have disastrous effect on the site. T o avoid this- it is ideal that the electric supply be programmed to be put off with the usage of heat sensors.
Which of the following is essential for backing up burglar alarms and surveillance systems? Choose two A. Burglar alarms are connected to the local police or security organization through telephone lines B. Burglar alarms are connected to the local police or security organization being powered by electric supply C. None
Which of the following is essential for backing up burglar alarms and surveillance systems? Choose two A. Burglar alarms are connected to the local police or security organization through telephone lines (Missed) B. Burglar alarms are connected to the local police or security organization being powered by electric supply (Missed) C. None Explanation Usually burglar alarms are connected to the local police or security organization through telephone lines as well as being powered by electric supply. Hence it is important to backup telephone lines as well as power lines.
Cipher text can be used for punch system locks. T/F? A. True B. False
Cipher text can be used for punch system locks. T/F? A. True B. False (Answer) Explanation Cipher locks can be used in punch lock systems and not Cipher text. Cipher text is an encryption scheme.
Which of the following provide protection to the enterprise premises against attackers? Choose two A. Burglar alarms B. Bullet proof jackets C. Surveillance systems D. Public address systems
Which of the following provide protection to the enterprise premises against attackers? Choose two A. Burglar alarms (Missed) B. Bullet proof jackets C. Surveillance systems (Missed) D. Public address systems (Your Answer) Explanation Burglar alarms and surveillance systems are an integral part of tracking and alerting authorities against intruders and attackers.
Which of the following can be referred to as highly confidential data? A. Intranet web site B. Customer information C. Budget related information D. None of the above
Which of the following can be referred to as highly confidential data? A. Intranet web site B. Customer information (Answer) C. Budget related information D. None of the above Explanation Customer information is usually classified as highly confidential information. Budget related information is classified as confidential information.
Which of the following will allow you to take stock of sensitive data in the organization? A. Scanning all floppies that are allowed into the network B. Running scan disk on all drives C. Auditing all servers for stored data D. None of the above
Which of the following will allow you to take stock of sensitive data in the organization? A. Scanning all floppies that are allowed into the network B. Running scan disk on all drives C. Auditing all servers for stored data (Answer) D. None of the above Explanation By auditing all servers in the network for stored data- you can classify data as sensitive or non-sensitive. Auditing is the best process of taking stock of sensitive data in the network.
Which of the following statements are true about the way data classification can be made? Choose two A. It must be adhoc or informal B. It may be adhoc or informal C. The strategy usually involves a scheme that splits into different levels D. The strategy usually involves a ten level scheme.
Which of the following statements are true about the way data classification can be made? Choose two A. It must be adhoc or informal B. It may be adhoc or informal (Missed) C. The strategy usually involves a scheme that splits into different levels (Missed) D. The strategy usually involves a ten level scheme. Explanation It is important to have a classification of data to ensure correct levels of security to the relevant type of data. Although it is possible to have informal methods to classify data- it is much methodical to employ a strategy to achieve the end result. The usual strategy employs a scheme that splits into different levels to classify data in the organization. The number of levels is usually dependent on the company needs and requirements or security.
As per a company policy- which of the following personnel should be considered as insiders? Choose two. A. Key employees B. Contractors C. Ex-employees D. Vendors
As per a company policy- which of the following personnel should be considered as insiders? Choose two. A. Key employees (Missed) B. Contractors (Missed) C. Ex-employees D. Vendors Explanation Although as per certain company policies that provide granular clarity and specific information- even ex-employees are considered as insiders- by and large many corporates consider only key employees and contractors as insiders as they require some kind of an access to the company resources and in specific network resources.
The block size in RC5 can range from 0 to 255. Y/N? A. Yes B. No
The block size in RC5 can range from 0 to 255. Y/N? A. Yes B. No (Answer) Explanation The block size in RC5 can be 32-bit- 64-bit or 128-bit.
Which of the following best describes Ron’s Code 2? A. RC2 or Ron’s code 2 is a 64-bit block cipher. B. It was devised by Ron Rivest. C. None
Which of the following best describes Ron’s Code 2? A. RC2 or Ron’s code 2 is a 64-bit block cipher. (Missed) B. It was devised by Ron Rivest. (Missed) C. None Explanation
Which of the following is provided by IDEA? Choose two. A. High level security B. Complex implementation C. Ease of implementation D. Average security level
Which of the following is provided by IDEA? Choose two. A. High level security (Missed) B. Complex implementation C. Ease of implementation (Missed) D. Average security level Explanation IDEA provides high level of security along with ease of implementation.
Differential cryptanalysis is nothing but pattern studying. T/F? A. True B. False
Differential cryptanalysis is nothing but pattern studying. T/F? A. True (Answer) B. False Explanation Differential Cryptanalysis is nothing but pattern studying. It chooses a pair of plain text with specific differences.
Which of the following is required by the cipher when it is important to maintain a message as a secret? A. Generate one cipher text for that message B. Generate at least 5 cipher text for that message C. Generate several cipher text. D. None of the above.
Which of the following is required by the cipher when it is important to maintain a message as a secret? A. Generate one cipher text for that message B. Generate at least 5 cipher text for that message C. Generate several cipher text. (Answer) D. None of the above. Explanation To keep a message a secret it is required that the cipher must be able to generate several cipher text.
Which of the following is the most common attack faced by the DES algorithm? A. DoS B. Brute force attack C. Code attack D. None of the above
Which of the following is the most common attack faced by the DES algorithm? A. DoS B. Brute force attack (Answer) C. Code attack D. None of the above Explanation Brute force attack is the most common attack faced by the DES algorithm
Cryptography without keys is more secure than cryptography with keys. T/F? A. True B. False
Cryptography without keys is more secure than cryptography with keys. T/F? A. True B. False (Answer) Explanation Cryptography without keys is not at all secure as the deciphering program will reside on the same media where the data or message is being received. In case of thest- the data can be stolen along with the deciphering program.