Sample Test for CSC459

  1. Defense, Offense, and Detection
  2. Control, Deterrence, and Integrity
  3. Defense, Deterrence, and Detection
  4. Defense, Auditing, and Authorization
  5. Confidentiality, Integrity, Availability

Correct Answer is: c.

  1. A user authenticating to a system and the system authenticating to the user
  1. A user authenticating to two systems at the same time
  2. A user authenticating to a server and then to a process
  3. A user authenticating, receiving a ticket, and then authenticating to a service

Correct Answer is: a.

A)Eavesdropping on a communication link

B)Working through a list of words

C)Session hijacking

D)Pretending to be someone or something else

Correct Answer is: d.

A)Role based

B)Decentralized

C)Rule based

D) Discretionary

Correct Answer is: a

A)Registering a user

B)Identifying a user

C)Validating a user

D)Authorizing a user

Correct Answer is: c

a)Senior management support

b)Biometric based smartcards for building access

c)Internal web access to policies and procedures

d)Centralized management of anti-virus on all desktop machines

Correct Answer is: a

a)It allows users to change access rights whenever they want.

b)It ensures secure communication between computers.

c)User membership in roles can be easily revoked and new ones established as job assignments dictate.

d)enforces an enterprise-wide security policy, standards, and guidelines.

Correct Answer is: c

a)Detective

b)Recovery

c)Corrective

d)Preventive

Correct Answer is: d

a)Identity

b)Registration

c)Authentication

d)Authorization

Correct Answer is: c.

a)Minimizes the amount of primary and secondary storage needed to store passwords

b)Prevents anyone from reading passwords in plaintext

c)Avoids excessive processing required by an asymmetric algorithm

d)Prevents replay attacks

Correct Answer is: b.

a)TLS/SSL with UDP, DTLS with TCP, SSH with UDP

b)IPsec with TCP, PGP with UDP, SET with TCP

c)TLS/SSL with TCP, DTLS with UDP, SSH with TCP

d)SET with TCP, PGP with UDP, SSL with TCP

Correct Answer is: c.

A)During requirements development.

b)During integration testing.

c)During design specifications.

d)During implementation.

Correct Answer: A

Question 12.The first phase of risk management is ____.

a. risk identification c. risk control
b. design d. risk evaluation

Question 13.Bit stream methods commonly use algorithm functions like the exclusive OR operation (____).

a. XOR c. NOR
b. EOR d. OR

Question 14____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.

a. Hash c. Key
b. Map d. Encryption

Question 15.____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.

a. MAC c. DES
b. PKI d. AES

12.ANS:A

13.ANS:A

14.ANS:A

15.ANS:B