求学资讯 思科认证 提问
思科认证 > 模拟试题

思科认证考试综合考试题(全英)(二)

来源:用户上传 上传用户:zfy 发布时间:2017-06-27

导读:
求学资讯网更新了“思科认证考试综合考试题(全英)(二)”,供考生参考,更多资讯请继续关注求学资讯网。

26.  Which one of the following traits allow macro viruses to spread more effectively than other types?
A. They infect macro systems as well as micro computers. 
B. They attach to executable and batch applications. 
C. They can be transported between different operating systems. 
D. They spread in distributed systems without detection

27.  Which one of the following security technologies provides safeguards for authentication before 
securely sending information to a web server?
A. Secure/Multipurpose Internet Mail Extension (S/MIME) 
B. Common Gateway Interface (CGI) scripts 
C. Applets 
D. Certificates

28.  The Common Criteria construct which allows prospective consumers or developers to create 
standardized sets of security requirements to meet there needs is ___
A. a Protection Profile (PP). 
B. a Security Target (ST). 
C. an evaluation Assurance Level (EAL). 
D. a Security Functionality Component Catalog (SFCC).

29.  Management can expect penetration tests to provide all of the following EXCEPT ___
A. identification of security flaws 
B. demonstration of the effects of the flaws 
C. a method to correct the security flaws. 
D. verification of the levels of existing infiltration resistance

30.  A country that fails to legally protect personal data in order to attract companies engaged in collection 
of such data is referred to as a ____
A. data pirate 
B. data haven 
C. country of convenience 
D. sanctional nation

31.  Satellite communications are easily intercepted because__
A. transmissions are continuous 24 hours per day. 
B. a satellite footprint is narrowly focused. 
C. a satellite footprint is very large. 
D. a satellite footprint does not change.

32.  Which one of the following attacks is MOST effective against an Internet Protocol Security (IPSEC) 
based virtual private network (VPN)?
A. Brute force 
B. Man-in-the-middle 
C. Traffic analysis 
D. Replay

33.  Audit trails based upon access and identification codes establish...
A. intrustion detection thresholds 
B. individual accountabbility 
C. audit review critera 
D. individual authentication

34.  Which factor is critical in all systems to protect data integrity?
A. Data classification 
B. Information ownership 
C. Change control 
D. System design

35.  The Trusted Computer Security Evaluation Criteria (TBSEC) provides
A. a basis for assessing the effectiveness of security controls built into automatic data-processing 
system products 
B. a system analysis and penetration technique where specifications and document for the system are 
analyzed. 
C. a formal static transition model of computer security policy that describes a set of access control 
rules. 
D. a means of restricting access to objects based on the identity of subjects and groups to which they 
belong.

 

36.  Which one of the following is NOT a requirement before a search warrant can be issued?
A. There is a probable cause that a crime has been committed. 
B. There is an expectation that evidence exists of the crime. 
C. There is probable cause to enter someone's home or business. 
D. There is a written document detailing the anticipated evidence.

37.  Why do vendors publish MD5 hash values when they provide software patches for their customers to 
download from the Internet?
A. Recipients can verify the software's integrity after downloading. 
B. Recipients can confirm the authenticity of the site from which they are downloading the patch. 
C. Recipients can request future updates to the software by using the assigned hash value. 
D. Recipients need the hash value to successfully activate the new software.

38.  What set of principles is the basis for information systems controls?
A. Authentication, audit trails, and awareness briefings 
B. Individual accountability, auditing, and separation of duties 
C. Need to know, identification, and authenticity 
D. Audit trails, limited tenure, and awareness briefings

39.  All of the following are basic components of a security policy EXCEPT the ___
A. definition of the issue and statement of relevant terms. 
B. statement of roles and responsibilities 
C. statement of applicability and compliance requirements. 
D. statement of performance of characteristics and requirements.

40.  In which state must a computer system operate to process input/output instructions?
A. User mode 
B. Stateful inspection 
C. Interprocess communication 
D. Supervisor mode

41.  In which situation would TEMPEST risks and technologies be of MOST interest?
A. Where high availability is vital. 
B. Where the consequences of disclose are very high. 
C. Where countermeasures are easy to implement 
D. Where data base integrity is crucial

42.  Which one of the following is concerned with masking the frequency, length, and origin-destination 
patterns of the communications between protocol entities?
A. Masking analysis 
B. Protocol analysis 
C. Traffic analysis 
D. Pattern analysis

43.  Tracing violations, or attempted violations of system security to the user responsible is a function of ___
A. authentication 
B. access management 
C. integrity checking 
D. accountability

44.  Why are macro viruses easy to write?
A. Active contents controls can make direct system calls 
B. The underlying language is simple and intuitive to apply. 
C. Only a few assembler instructions are needed to do damage. 
D. Office templates are fully API compliant.

45.  Digital signature users register their public keys with a certification authority, which distributes a 
certificate containing the user's public key and digital signature of the certification authority. In 
create the certificate, the user's public key and the validity period are combined with what other 
information before computing the digital signature?
A. Certificate issuer and the Digital Signature Algorithm identifier 
B. User's private key and the identifier of the master key code 
C. Name of secure channel and the identifier of the protocol type 
D. Key authorization and identifier of key distribution center

46.  Which of the following is a weakness of both statistical anomaly detection and pattern matching?
A. Lack of ability to scale. 
B. Lack of learning model. 
C. Inability to run in real time. 
D. Requirement to monitor every event.

47.  Which one of the following is the Open Systems Interconnection (OSI) protocol for message handling?
A. X.25 
B. X.400 
C. X.500 
D. X.509

48.  Which one of the following actions should be taken FIRST after a fire has been detected?
A. Turn off power to the computers 
B. Call the fire department 
C. Notify management 
D. Evacuate all personnel

49.  Ensuring the integrity of business information is the PRIMARY concern of_____
A. Encryption Security 
B. Procedural Security
C. Logical Security 
D. On-line Security

50.  Why is the investigation of computer crime involving malicious damage especially challenging?
A. Information stored in a computer is intangible evidence. 
B. Evidence may be destroyed in an attempt to restore the system. 
C. Isolating criminal activity in e detailed audit log is difficult. 
D. Reports resulting from common user error often obscure the actual violation.

 


声明:本站为免费网络服务提供商,网站所有信息均为用户自行发布并由用户承担相应法律责任,本站不对其真实性及合法性负责,如涉及侵权或者信息违法,请你及时与本站联系删除。

阅读 1490 举报

相关推荐
评论0

当前没有评论内容

发表评论 0条评论
37
微博
QQ
QQ空间
微信
取消