A. HIPAA
B. SOX
C. GLBA
D. FERPA
Answer: D
The Family Educational Rights and Privacy Act (FERPA) protects the rights of students and the parents of minor students.
A. PGP
B. S/MIME
C. MOSS
D. PEM
Answer: A
Phil Zimmerman’s Pretty Good Privacy (PGP) package relies on the construction of a web of trust between system users.
A. Spamming
B. Impersonation
C. Masquerading
D. Spoofing
Answer: A
Spamming is an attack in which you receive unwanted, inappropriate, or irrelevant email messages.
A. Incremental backup
B. Differential backup
C. Full backup
D. Electronic vaulting
Answer: D
Electronic vaulting describes the transfer of backup data to a remote backup site in a bulk-transfer fashion.
A. People
B. Documentation
C. Infrastructure
D. Building/facilities
Answer: B
The BCP normally covers three major asset categories: people, infrastructure, and buildings/facilities.
A. ssh
B. Web browser
C. telnet
D. Ping
Answer: B
The server is likely running a secure website on port 443. Using a web browser to access the site may provide important information about the site’s purpose.
A. Copyright
B. Trademark
C. Patent
D. Trade secret
Answer: D
Trade secrets are one of the best legal protections for computer software.
8. What is the value of the logical operation shown here? X: 0 1 1 0 1 0 Y: 0 0 1 1 0 1 \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ X ⨁ Y: ?
A. 0 1 1 1 1 1
B. 0 1 0 1 1 1
C. 0 0 1 0 0 0
D. 1 0 0 0 0 0
Answer: B
The ⨁ symbol represents the exclusive OR (XOR) function, which is true when one and only one of the input bits is true.
A. TOCTTOU
B. Buffer overflow
C. XSS
D. XSRF
Answer: B
Buffer overflow vulnerabilities exist when a developer does not properly validate user input to ensure that it is of an appropriate size. Input that is too large can “overflow” a data structure to affect other data stored in the computer’s memory.
A. ROT2
B. ROT3
C. ROT8
D. ROT11
Answer: B
The Caesar cipher, also known as the ROT3 cipher, shifts all characters in the plain text three letters to the right to create the cipher text.
A. Ultra
B. Purple
C. Enigma
D. VENONA
Answer: B
The Japanese Purple cipher system was broken by the Allies and contributed to their victory in World War II. Ultra was the effort to break the German Enigma cipher system. VENONA was an American effort to break a Soviet cipher during the 1940s.
A. 3
B. 4
C. 5
D. 6
Answer: A
Nineteen divided by 4 equals 4, with a remainder value of 3.
A. UDP error
B. TCP RST
C. ICMP Type 3
D. DNS lookup error
Answer: C
SNMP is a UDP-based service. UDP does not have any means of sending back errors, because it is a simplex protocol. Thus, when UDP errors occur, the system will switch protocols and use ICMP to send back information. In the case of a non-existing service, the port is thus not available, so an ICMP Type 3 error will be returned.
A. Christopher’s public key
B. Christopher’s private key
C. Matthew’s public key
D. Matthew’s private key
Answer: A
Matthew uses Christopher’s public key to verify the digital signature on the message.
A. Hot site
B. Warm site
C. Cold site
D. All of the above
Answer: A
Hot sites provide backup facilities maintained in constant working order and fully capable of taking over business operations.
A. Risk assessment
B. Likelihood assessment
C. Impact assessment
D. Resource prioritization
Answer: C
Loss expectancies are a measure of impact and are calculated during the impact assessment phase.
A. MBR virus
B. File infector virus
C. Stealth virus
D. Polymorphic virus
Answer: A
Master boot record (MBR) viruses infect the system’s boot sector and load when the system is started.
A. NIST
B. CIA
C. FBI
D. NSA
Answer: A
The National Institute of Standards and Technology (NIST) is responsible for developing standards and guidelines for federal computer systems. They may draw on the technical expertise of the National Security Agency for assistance.
A. Department of State
B. Department of Education
C. Department of Commerce
D. Department of Defense
Answer: C
The Department of Commerce maintains the EU safe harbor provisions for American companies.
A. Hierarchical
B. Normalized
C. Distributed
D. Relational
Answer: C
The distributed data model has data stored in more than one database, but the data is still logically connected. The user perceives the database as a single entity, even though it comprises numerous parts interconnected over a network.
A. Privileged mode
B. User mode
C. Supervisory mode
D. Kernel mode
Answer: B
User mode is the basic mode used by the CPU when executing user applications. In this mode, the CPU allows the execution of only a portion of its full instruction set. This is designed to protect users from accidentally damaging the system through the execution of poorly designed code or the unintentional misuse of that code.
A. Dollar values
B. Concrete percentages
C. Historical logs and records
D. Opinions
Answer: D
The process of performing qualitative risk analysis involves judgment, intuition, and experience—in other words, opinions.
A. The encryption key must be at least one-half the length of the message to be encrypted.
B. The encryption key must be randomly generated.
C. Each one-time pad must be used only once.
D. The one-time pad must be physically protected against disclosure.
Answer: A
The encryption key must be at least as long as the message to be encrypted. This is because each key element is used to encode only one character of the message. The three other facts listed are all characteristics of one-time pad systems.
A. Whitelisting
B. Blacklisting
C. Sampling
D. Watermarking
Answer: A
Whitelisting allows administrators to specify a list of authorized applications. Any applications not on the list cannot run. Blacklisting is a list of unauthorized applications. Sampling is a form of data reduction and not related to running applications. Watermarking embeds an image or other mark on printed documents and files and helps prevent data loss.