Sec+ 5

Is this your test? Login to manage it. If not, you can build a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
255.255.0.0 is a
2.
1 point
The main reason for preventing password re-use is
3.
1 point
A software developer has introduced a feature in an application that permits him to access the application without the need to log in. This feature is known as a
4.
1 point
A cryptosystem uses two-digit numerals to represent each character of a message. This is a
5.
1 point
California state law SB-1386
6.
1 point
The purpose of penetration testing is
7.
1 point
An advantage of video surveillance motion sensing recording over continuous recording is
8.
1 point
The four basic requirements in the Orange Book are
9.
1 point
A document that is unclassified
10.
1 point
In a symmetric cryptosysystem, two users who wish to exchange encrypted message exchange cryptovariables. The next thing the users should do is
11.
1 point
In the resource \\usdb01\symm\dew\src\ usdb01 is a
12.
1 point
An attacker has obtained a file containing hashed passwords. The fastest way to crack the hashed passwords is
13.
1 point
The best method for defending against cross-site request forgery (CSRF) attack is
14.
1 point
A cryptosystem uses a key that is the same length of the message. The key is used only for this message. This is
15.
1 point
The purpose of the Sarbanes-Oxley Act of 2002 is to
16.
1 point
A disadvantage of HIDS is all of the following EXCEPT
17.
1 point
The primary advantage for remote monitoring of datacenter access controls is
18.
1 point
TCSEC evaluation criteria are
19.
1 point
A document that lists approved protocols is known as a
20.
1 point
An encryption algorithm that rearranges bits, characters, or blocks of data known as a
21.
1 point
Systems on an internal network have RFC 1918 network addresses. To permit these systems to communicate with systems on the internet, what should be implemented on the firewall?
22.
1 point
The purpose of a user account access review is
23.
1 point
The most effective countermeasure for session hijacking is
24.
1 point
A cryptologist has determined that a cryptosystem has a weak PRNG. This can lead to
25.
1 point
Record keeping that is related to the acquisition and management of forensic evidence is known as
26.
1 point
The purpose of audit trails includes all of the following EXCEPT
27.
1 point
In a datacenter that provides dual power feeds to each equipment rack, components with dual power supplies are connected to each power feed. Why should power circuits not be loaded over 40% capacity?
28.
1 point
A web application that uses sequential session identifiers
29.
1 point
All of the following statements about policies are true EXCEPT
30.
1 point
An encryption algorithm that replaces bits, characters, or blocks in plaintext with alternate bits, characters, or blocks is known as a
31.
1 point
Two-factor authentication is preferred for VPN because
32.
1 point
An audit of user access has revealed that user accounts are not being locked when employees leave the organization. The best way to mitigate this finding is
33.
1 point
A blogging site allows users to embed JavaScript in the body of blog entries. This will allow what type of attack
34.
1 point
A system designer needs to choose a stream cipher to encrypt data. The designer should choose
35.
1 point
Evidence that is obtained through illegal means
36.
1 point
A particular type of security incident occurs frequently in an organization. What should be performed to reduce the frequency of these incidents?
37.
1 point
What procedure should be followed by personnel in case of fire in a data center?
38.
1 point
The following statements about the Common Criteria are EXCEPTED
39.
1 point
An organization has employees in many countries, where laws vary on the type of background checks that can be performed. The best approach for background checks is
40.
1 point
A disadvantage of a symmetric cryptosystem is
41.
1 point
Two organizations exchange data via FTP. The best choice to make this more secure is
42.
1 point
An attacker is capturing a user's keystrokes during authentication. The attacker may be preparing to lunch a
43.
1 point
Users in a company have received e-mail messages claiming to be from the company's IT department with instructions on installing a security patch. The URL points to a page resembles the company's IT Help desk home page. This may be a
44.
1 point
A laptop containing several private encryption keys has been stolen. The owner of the encryption keys should
45.
1 point
A company outsources its credit card processing to a third-party organization. The company should
46.
1 point
Administration of a centralized audit log server should be performed by
47.
1 point
The idea level of relative humidity for datacenter computing equipment is
48.
1 point
A security manager wishes to establish a set of access control rules that specify which organization job titles are permitted to have which roles in a system. The model that the security manager should use as a model is
49.
1 point
A decision on how to resolve an identified risk is known as
50.
1 point
The advantage of Cipher Block Chaining (CBC) is