A. L2F
B. SKIP
C. SWIPE
D. SSL
Answer: D
Secure Sockets Layer (SSL) is an encryption protocol developed by Netscape to protect the communications between a web server and a web browser.
A. Budget
B. Human resource allocation
C. Controls gap
D. Fault tolerance
Answer: C
The controls gap is the difference between total risk and risudual risk.
A. Manual backups
B. Automated backups
C. Remote mirroring
D. Remote journaling
Answer: C
Remote mirroring is the most advanced, complete, and expensive off-site backup solution. With this solution, a live database server is kept off site at some secure remote location.
A. Policy
B. Standard
C. Procedure
D. Guideline
Answer: D
A guideline offers recommendations on how standards and baselines are implemented and serves as an operational guide for both security professionals and users. Guidelines are flexible so they can be customized for each unique system or condition and can be used in the creation of new procedures (i.e., step-by-step guides).
A. Initial
B. Repeatable
C. Defined
D. Managed
Answer: C
In the Defined stage of the CMM, all development projects take place within the constraints of a standardized management model.
A. Static packet filtering
B. Application-level gateway
C. Stateful inspection
D. Dynamic packet filtering
Answer: A
A static packet-filtering firewall filters traffic by examining data from a message header.
A. Data interception
B. Switch console port access
C. Eavesdropping
D. Cloning
Answer: B
A switch console port exists only on a switch; a cell phone cannot be used to access such ports.
A. Daily
B. Weekly
C. Monthly
D. At each release
Answer: A
The agile development process requires that business users interact with developers on a daily basis.
A. IDS
B. Honeynet
C. Padded cell
D. Vulnerability scanner
Answer: B
Honeynets are entire networks created to serve as a snare for intruders. They look and act like legitimate networks, but they are 100 percent fake. Honeynets tempt intruders with seemingly vulnerable systems with attractive artificial data.
A. Stream cipher
B. Caesar cipher
C. Block cipher
D. ROT3 cipher
Answer: A
Stream ciphers operate on one character or bit of a message (or data stream) at a time.
A. Nondiscretionary access control
B. Mandatory access control
C. Discretionary access control
D. Logical access control
Answer: B
Mandatory access control enforces an access policy that is determined by the system, not the object owner.
A. 0 to 1,023
B. 80, 135, 110, 25
C. 0 to 65, 536
D. 32,000 to 65,536
Answer: A
Ports 0 to 1,023 are the well-known ports.
A. RAID 1
B. RAID 6
C. RAID 1+5
D. RAID 1+0
Answer: C
RAID 1+5 is nested RAID involving the mirroring (RAID 1) of striped drive sets with evenly distributed parity data (RAID 5).
A. Supporting rollback
B. Detailed documentation
C. Systematic analysis of impending alterations
D. Use of the spiral model of project management
Answer: D
The spiral model of project management does not directly relate to configuration management. Configuration management is about managing change that could result in reduced security.
A. RAID
B. Redundant servers or clusters
C. High-speed network connection
D. Failover solutions
Answer: C
A high-speed network connection is not a single point of failure avoidance technique, especially if you have only one.
A. Biba
B. Take grant
C. Goguen−Meseguer
D. Sutherland
Answer: D
The Sutherland model focuses on preventing interference in support of integrity. This model is based on the idea of defining a set of system states, initial states, and state transitions. Through the use of and limitations to only these predetermined secure states, integrity is maintained and interference is prohibited.
A. Alaska
B. Oregon
C. Idaho
D. Georgia
Answer: D
Alaska, Oregon, and Idaho are located in regions that are rated high on seismic activity; Georgia, however, has its own unique set of environmental weather conditions.
A. 169.254.1.1
B. 192.168.1.1
C. 172.16.1.1
D. 10.1.1.1
Answer: A
The 169.254.x.x range is usually employed by the Microsoft APIPA response to failed DHCP services.
A. Error checking
B. Redundancy
C. Flow control
D. Bandwidth on demand
Answer: B
In a discussion of high-speed telco links or network carrier services, fault tolerance means to have redundant connections.
A. Signature detection
B. Heuristic detection
C. Data integrity assurance
D. Automated reconstruction
Answer: B
Heuristic detection techniques develop models of normal activity and then identify deviations from that baseline.
A. Distributed denial of service
B. Denial of service
C. Diffracted denial of service
D. Distributed reflective denial of service
Answer: D
Coordinated attack efforts between cooperative machines using traffic in an entirely legitimate manner are distributed reflective denial of service attacks.
A. Isolation
B. Bounds
C. Confinement
D. Authentication
Answer: B
The bounds of a process consist of limits set on the memory addresses and resources it can access. The bounds state or define the area within which a process is confined.
A. One
B. Two
C. Four
D. One per user
Answer: B
Each participant in an asymmetric cryptosystem is issued two keys: a public key and a private key.
A. 1 percent
B. 2 percent
C. 20 percent
D. 50 percent
Answer: B
The annualized rate of occurrence (ARO) is the likelihood that a risk will materialize in a given year. In this example, the risk will occur once out of every 50 years, 1/50 = 2%.