Identify the letter of the choice that best completes the statement or answers the question




НазваниеIdentify the letter of the choice that best completes the statement or answers the question
страница1/7
Дата конвертации30.10.2012
Размер0.79 Mb.
ТипДокументы
  1   2   3   4   5   6   7
CCIS2400 (Security Essentials) Chapter 13 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. Digital evidence can be retrieved from which of the following devices?

a.

pagers

d.

PDA’s

b.

cell phones

e.

all of the above

c.

digital cameras



____ 2. Today, _____ of corporate records are stored in digital format.

a.

40%

c.

70%

b.

60%

d.

90%



____ 3. The _____ is an example of metadata.

a.

file name

c.

file content

b.

file type

d.

both a and b



____ 4. If a hacker wants to scramble a message so that it cannot be viewed, what type of technology would they use?

a.

cryptography

c.

forensics

b.

steganography

d.

haliography



____ 5. The _____ act of 2002 mandates that federal agencies must establish incidence response capabilities consistent with the guidelines and standards established by the National Institute of Standards and Technology (NIST).

a.

Sarbox

c.

GLBA

b.

HIPAA

d.

FISMA



____ 6. ____ is/are not recorded in a file on the hard drive or an image backup and would be considered to be volatile data.

a.

Program executables

c.

User files

b.

Logon sessions

d.

The directory structure



____ 7. ____ can cause problems for mirror image software.

a.

Incompatible operating systems

c.

Bad sectors on a hard drive

b.

Antivirus applications

d.

Formatted hard drives



____ 8. _____ page files are of interest to a computer forensics specialist because they normally store large amounts of information for long periods of time.

a.

Temporary

c.

Sequential

b.

Historical

d.

Permanent



____ 9. Windows stores files on a hard drive or floppy disk in 512-byte blocks called _____.

a.

clusters

c.

cylinders

b.

frames

d.

sectors



____ 10. After a computer crime has occurred, Jason’s forensic team take custody of computers, peripherals, and media that have been used to commit the crime. Which step has the forensic team executed?

a.

Securing the crime scene

c.

Establishing the chain of custody

b.

Preserving the data

d.

Examining for evidence



____ 11. In 2003, a _____ vulnerability was exposed by the Sasser worm.

a.

Internet Explorer

c.

Windows networking

b.

Microsoft Outlook

d.

SQL server



____ 12. Isolation tools can be used to inspect systems for _____.

a.

active firewalls

c.

the latest antivirus signatures

b.

secure configuration settings

d.

all of the above



____ 13. The Trusted Platform Model uses a(n) _____ to provide a higher level of security in computer hardware.

a.

cryptographic coprocessor

c.

cryptographic microprocessor

b.

secure RAM subsystem

d.

encrypted disk subsystem



____ 14. An average users networked computer makes less than _____ network connections per second.

a.

2

c.

10

b.

5

d.

50



____ 15. A(n) _____ is an essential tool on all networks and is often used to provide the first layer of defense.

a.

router

c.

firewall

b.

proxy server

d.

intrusion detection system



____ 16. _____ is included as part of advanced forensic examinations.

a.

Analyzing Web-related e-mail

c.

Data recovery from encrypted files

b.

Managing personnel

d.

Network protocol functions



____ 17. Which of these is NOT a reason that computer forensics is important?

a.

Large amount of digital evidence

c.

Higher level of computer skills by criminals

b.

Increased scrutiny by legal profession

d.

High turnover in IT staffing



____ 18. Which of these is NOT a challenge facing computer forensic investigators?

a.

Low cost of evidence

c.

Distribution of evidence

b.

Volume of electronic evidence

d.

Dynamic content of electronic evidence



____ 19. _______________ contains information about files, but can result in false leads.

a.

Metadata

c.

Macrodata

b.

Microdata

d.

Sumdata



____ 20. _______________ attempts to hide the existence of data.

a.

Cryptography

c.

Steganography

b.

Decryption

d.

HDR



____ 21. The first step a forensics-response team performs is to ________________________.

a.

Secure the crime scene

c.

Use the OS to copy the drive to a CD

b.

Make a bitmap image of the hard drive

d.

Move the computer to a secure location



CCIS2400 (Security Essentials) Chapter 12 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. The _____ Act protects information financial institutions collect about customers.

a.

The Health Insurance Portability and Accountability

b.

Gramm-Leach-Bliley

c.

Sarbanes-Oxley

d.

Federal Security



____ 2. Identity management can be used for _____.

a.

users

d.

both a and b

b.

computers that share data

e.

a, b, and c

c.

cellular phones



____ 3. XYZ Corp is implementing an identity management system.which requires strong passwords. The password _____ would qualify for use at XYZ Corp.

a.

telephoto

c.

HG*f675&5WScrd

b.

a87$sa

d.

HowaRdstREeT



____ 4. The centralized approach to managing responsibility _____ than the decentralized approach.

a.

increases costs more

c.

is more flexible

b.

takes longer to make changes

d.

is more accepted



____ 5. Privileges can be assigned by the _____.

a.

location of the user

c.

time the user is logged on

b.

role the user assumes

d.

actions the user performs



____ 6. What is the name of the Windows account that provides the highest level of privileges?

a.

supervisor

c.

administrator

b.

admin

d.

superuser



____ 7. Linux uses the range _____ for UID numbers.

a.

0-99

c.

0-32065

b.

0-4096

d.

0-65535



____ 8. The _____ model of access control poses risks that incorrect permissions may be granted to a subject who should not have them.

a.

Discretionary Access Control

c.

Role Based Access Control

b.

Mandatory Access Control

d.

User Based Access Control



____ 9. David Brown, the network administrator is concerned that several of the user accounts for employees in the marketing department have been set up incorrectly and have unrestricted access to all employee financial records on the accounting server. What type of audit should he perform to determine if his suspicions are correct?

a.

user

c.

escalation

b.

privilege

d.

security



____ 10. Without proper _____, a future change may negate or diminish a previous change or open a security vulnerability.

a.

structure

c.

documentation

b.

auditing

d.

procedure



____ 11. On a Change Request Form, the _____ is a table of predefined categories that reflects the probability of failure and the ease of change reversal.

a.

Risk category

c.

Failure category

b.

Impact category

d.

Change component



____ 12. The Management checklist on the change request is a list of indicators showing that conditions normally required for change approval such as a _____ plan, have been met.

a.

test

d.

both a and b

b.

backout

e.

a, b, and c

c.

training



____ 13. What are the two major types of security changes that need to be properly documented?

a.

changes in user privileges, classification

b.

system architecture, classification

c.

system architecture, changes in security personnel

d.

changes in user privileges, changes in security personnel



____ 14. _____-based DRM is proprietary and cannot be easily transferred between applications.

a.

Server

c.

File

b.

Application

d.

Media



____ 15. Shayla a professional photographer wants to use digital rights management to protect her digital photographs on her web site. What type of DRM could she use to trace illegal copies of her pictures?

a.

Activation codes

c.

Physical copy protection

b.

Software keys

d.

Digital watermarks



____ 16. The _____ generation is self-reliant, distrustful of institutions and adaptive to technology.

a.

baby boomer

c.

generation X

b.

traditionalist

d.

millennial



____ 17. Which of these is NOT a problem associated with users identifying and authenticating themselves using multiple accounts?

a.

Regulatory legislation

c.

E-commerce bottlenecks

b.

Weak password creation

d.

Underworked support-staff



____ 18. ________________ allows a user’s singly-authenticated ID to be shared across multiple networks.

a.

Identity management

c.

Privilege management

b.

Password Sharing Protocol (PSP)

d.

Change management



____ 19. Which of these is NOT a a key element of identity management?

a.

Single sign-on

c.

Password resets

b.

Password synchronization

d.

RC4 hashing



____ 20. Privilege management organizational structures can be _____________________.

a.

Centralized or de-centralized

c.

Internet-based or client-based

b.

Corporate or private

d.

Secure or not secure


  1   2   3   4   5   6   7

Добавить в свой блог или на сайт

Похожие:

Identify the letter of the choice that best completes the statement or answers the question iconSection 1 Analytic Question Answers

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers to questions not answered at Mayor’s Question Time on

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers arising from the Plenary Assembly Question and Answer Session with Transport for London

Identify the letter of the choice that best completes the statement or answers the question iconNo fee of any kind may be charged for the material; all copied material must clearly identify its source and contain the statement on copyright shown below

Identify the letter of the choice that best completes the statement or answers the question iconFinancial statements Income statement Balance sheet Statement of cash flows Statement of changes in equity Notes to and forming part of the financial report

Identify the letter of the choice that best completes the statement or answers the question iconAppendix 1 London Assembly (Mayor’s Question Time) 12 December 2007 Transcript – Question and Answer Session

Identify the letter of the choice that best completes the statement or answers the question iconPhil265/Rels265 Final Exam 31 Multiple choice or True-False worth 1 mark each 3 Short Answer Questions from choice of 5 worth 3 marks each (paragraph or two in length) Introduction to Philosophy

Identify the letter of the choice that best completes the statement or answers the question iconThe Very Handy Manual: How to Catch and Identify Bees

Identify the letter of the choice that best completes the statement or answers the question icon20 Answers

Identify the letter of the choice that best completes the statement or answers the question iconLetter from the President


Разместите кнопку на своём сайте:
lib.convdocs.org


База данных защищена авторским правом ©lib.convdocs.org 2012
обратиться к администрации
lib.convdocs.org
Главная страница