26. Which one of the following traits allow macro viruses to spread more effectively than other types?
A. They infect macro systems as well as micro computers.
B. They attach to executable and batch applications.
C. They can be transported between different operating systems.
D. They spread in distributed systems without detection
27. Which one of the following security technologies provides safeguards for authentication before
securely sending information to a web server?
A. Secure/Multipurpose Internet Mail Extension (S/MIME)
B. Common Gateway Interface (CGI) scripts
C. Applets
D. Certificates
28. The Common Criteria construct which allows prospective consumers or developers to create
standardized sets of security requirements to meet there needs is ___
A. a Protection Profile (PP).
B. a Security Target (ST).
C. an evaluation Assurance Level (EAL).
D. a Security Functionality Component Catalog (SFCC).
29. Management can expect penetration tests to provide all of the following EXCEPT ___
A. identification of security flaws
B. demonstration of the effects of the flaws
C. a method to correct the security flaws.
D. verification of the levels of existing infiltration resistance
30. A country that fails to legally protect personal data in order to attract companies engaged in collection
of such data is referred to as a ____
A. data pirate
B. data haven
C. country of convenience
D. sanctional nation
31. Satellite communications are easily intercepted because__
A. transmissions are continuous 24 hours per day.
B. a satellite footprint is narrowly focused.
C. a satellite footprint is very large.
D. a satellite footprint does not change.
32. Which one of the following attacks is MOST effective against an Internet Protocol Security (IPSEC)
based virtual private network (VPN)?
A. Brute force
B. Man-in-the-middle
C. Traffic analysis
D. Replay
33. Audit trails based upon access and identification codes establish...
A. intrustion detection thresholds
B. individual accountabbility
C. audit review critera
D. individual authentication
34. Which factor is critical in all systems to protect data integrity?
A. Data classification
B. Information ownership
C. Change control
D. System design
35. The Trusted Computer Security Evaluation Criteria (TBSEC) provides
A. a basis for assessing the effectiveness of security controls built into automatic data-processing
system products
B. a system analysis and penetration technique where specifications and document for the system are
analyzed.
C. a formal static transition model of computer security policy that describes a set of access control
rules.
D. a means of restricting access to objects based on the identity of subjects and groups to which they
belong.
36. Which one of the following is NOT a requirement before a search warrant can be issued?
A. There is a probable cause that a crime has been committed.
B. There is an expectation that evidence exists of the crime.
C. There is probable cause to enter someone's home or business.
D. There is a written document detailing the anticipated evidence.
37. Why do vendors publish MD5 hash values when they provide software patches for their customers to
download from the Internet?
A. Recipients can verify the software's integrity after downloading.
B. Recipients can confirm the authenticity of the site from which they are downloading the patch.
C. Recipients can request future updates to the software by using the assigned hash value.
D. Recipients need the hash value to successfully activate the new software.
38. What set of principles is the basis for information systems controls?
A. Authentication, audit trails, and awareness briefings
B. Individual accountability, auditing, and separation of duties
C. Need to know, identification, and authenticity
D. Audit trails, limited tenure, and awareness briefings
39. All of the following are basic components of a security policy EXCEPT the ___
A. definition of the issue and statement of relevant terms.
B. statement of roles and responsibilities
C. statement of applicability and compliance requirements.
D. statement of performance of characteristics and requirements.
40. In which state must a computer system operate to process input/output instructions?
A. User mode
B. Stateful inspection
C. Interprocess communication
D. Supervisor mode
41. In which situation would TEMPEST risks and technologies be of MOST interest?
A. Where high availability is vital.
B. Where the consequences of disclose are very high.
C. Where countermeasures are easy to implement
D. Where data base integrity is crucial
42. Which one of the following is concerned with masking the frequency, length, and origin-destination
patterns of the communications between protocol entities?
A. Masking analysis
B. Protocol analysis
C. Traffic analysis
D. Pattern analysis
43. Tracing violations, or attempted violations of system security to the user responsible is a function of ___
A. authentication
B. access management
C. integrity checking
D. accountability
44. Why are macro viruses easy to write?
A. Active contents controls can make direct system calls
B. The underlying language is simple and intuitive to apply.
C. Only a few assembler instructions are needed to do damage.
D. Office templates are fully API compliant.
45. Digital signature users register their public keys with a certification authority, which distributes a
certificate containing the user's public key and digital signature of the certification authority. In
create the certificate, the user's public key and the validity period are combined with what other
information before computing the digital signature?
A. Certificate issuer and the Digital Signature Algorithm identifier
B. User's private key and the identifier of the master key code
C. Name of secure channel and the identifier of the protocol type
D. Key authorization and identifier of key distribution center
46. Which of the following is a weakness of both statistical anomaly detection and pattern matching?
A. Lack of ability to scale.
B. Lack of learning model.
C. Inability to run in real time.
D. Requirement to monitor every event.
47. Which one of the following is the Open Systems Interconnection (OSI) protocol for message handling?
A. X.25
B. X.400
C. X.500
D. X.509
48. Which one of the following actions should be taken FIRST after a fire has been detected?
A. Turn off power to the computers
B. Call the fire department
C. Notify management
D. Evacuate all personnel
49. Ensuring the integrity of business information is the PRIMARY concern of_____
A. Encryption Security
B. Procedural Security
C. Logical Security
D. On-line Security
50. Why is the investigation of computer crime involving malicious damage especially challenging?
A. Information stored in a computer is intangible evidence.
B. Evidence may be destroyed in an attempt to restore the system.
C. Isolating criminal activity in e detailed audit log is difficult.
D. Reports resulting from common user error often obscure the actual violation.