CISSP-Topic 14, Exam SET B

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The technique of confusion, proposed by Claude Shannon, is used in block ciphers to: A. Conceal the statistical connection between ciphertext and plaintext. B. Implement transposition to obtain the ciphertext. C. Spread the influence of a plaintext character over many ciphertext characters. D. Limit the influence of a plaintext character across ciphertext characters.

Answer: A

What is a computer bus? A. A group of conductors for the addressing of data and control B. A message in object-oriented programming C. A message sent around a Token Ring network D. Secondary storage

Answer: A * Answer "A message sent around a Token Ring network" is a token. * Answer Secondary stora refers to disk storage. * Answer "A message in object-oriented programming" is a distracter.

ATrusted Computing Base (TCB) is defined as: A. The total combination of protection mechanisms within a computer system that are trusted to enforce a security policy. B. A system that employs the necessary hardware and software assurance measures to enable processing multiple levels of classified or sensitive information to occur. C. The boundary separating the trusted mechanisms from the remainder of the system. D. A trusted path that permits a user to access resources.

Answer: A * Answer "The boundary separating the trusted mechanisms from the remainder of the system" is the security perimeter. * Answer "A trusted path that permits a user to access resources" is the definition of a trusted path. * Answer "A system that employs the necessary hardware and software assurance measures to enable processing multiple levels of classified or sensitive information to occur" is the definition of a trusted computer system.

Which statement below is accurate about the difference between Ethernet II and 802.3 frame formats? A. 802.3 uses a Length field, whereas Ethernet II uses a Type field. B. Ethernet II uses an 8-byte Preamble field, whereas 802.3 uses a 4-byte FCS field. C. 802.3 uses a Type field, whereas Ethernet II uses a Length field. D. Ethernet II uses a 4-byte FCS field, whereas 802.3 uses an 8-byte Preamble field.

Answer: A 802.3 uses a Length field which indicates the number of data bytes that are in the data field. Ethernet II uses a Type field in the same 2 bytes to identify the message protocol type. Both frame formats use a 8-byte Preamble field at the start of the packet, and a 4- byte Frame Check Sequence (FCS) field at the end of the packet, so those choices would be incorrect as to a difference in the frame formats. Sources: Gigabit Ethernet by Jayant Kadambi, Ian Crayford, and Mohan Kalkunte (Prentice Hall PTR, 1998) and CCNA Study Guide by Todd Lammle, Donald Porter, and James Chellis (Sybex, 1999).

Enigma was: A. The German rotor machine used in WWII. B. Probably the first programmable digital computer. C. An English project created to break German ciphers. D. The Japanese rotor machine used in WWII.

Answer: A Answer "An English project created to break German ciphers" describes the Ultra Project based in Bletchley Park , England. Answer "The Japanese rotor machine used in WWII" describes the Japanese Purple Machine. Answer "Probably the first programmable digital computer" refers to Collossus.

In the Common Criteria, a Protection Profile: A. Specifies the security requirements and protections of the products to be evaluated. B. Is also known as the Orange Book. C. Is also known as the Target of Evaluation (TOE). D. Specifies the mandatory protection in the product to be evaluated.

Answer: A Answer "Specifies the mandatory protection in the product to be evaluated" is a distracter. * Answer "Is also known as the Target of Evaluation (TOE)" is the product to be evaluated. * Answer "Is also known as the Orange Book" refers to TCSEC.

Which backup method listed below will probably require the backup operator to use the most number of tapes for a complete system restoration, if a different tape is used every night in a five-day rotation? A. Incremental Backup Method B. Ad Hoc Backup Method C. Full Backup Method D. Differential Backup Method

Answer: A Most backup methods use the Archive file attribute to determine whether the file should be backed up or not. The backup software determines which files need to be backed up by checking to see if the Archive file attribute has been set, and then resets the Archive bit value to null after the backup procedure. The Incremental Backup Method backs up only files that have been created or modified since the last backup was made, because the Archive file attribute is reset. This can result in the backup operator needing several tapes to do a complete restoration, as every tape with changed files as well as the last full backup tape will need to be restored. * a Full or Complete backup backs up all files in all directories stored on the server regardless of when the last backup was made and whether the files have already been backed up. The Archive file attribute is changed to mark that the files have been backed up, and the tapes or tapes will have all data and applications on it. It's an incorrect answer for this question, however, as it's assumed answers Differential Backup Method and Incremental Backup Method will additionally require differential or incremental tapes. * the Differential Backup Method, backs up only files that have been created or modified since the last backup was made, like an incremental backup. However, the difference between an incremental backup and a differential backup is that the Archive file attribute is not reset after the differential backup is completed, therefore the changed file is backed up every time the differential backup is run. The backup set grows in size until the next full backup as these files continue to be backed up during each subsequent differential backup, until the next complete backup occurs. The advantage of this backup method is that the backup operator should only need the full backup and the one differential backup to restore the system. Table shows these three backup methods. Exhibit: Answer "Ad Hoc Backup Method" is a distracter.

What is a protocol that adds digital signatures and encryption to Internet MIME (Multipurpose Internet Mail Extensions)? A. S/MIME B. PGP C. SET/MIME D. IPSEC

Answer: A The MIME protocol specifies a structure for the body of an email message. MIME supports a number of formats in the email body, including graphic, enhanced text and audio, but does not provide security services for these messages. S/MIME defines such services for MIME as digital signatures and encryption based on a standard syntax. *Answer IPSEC is incorrect since IPSEC is not an email protocol but is a standard that provides encryption, access control, nonrepudiation, and authentication of messages over IP. It is designed to be functionally compatible with IPv6. Answer b is incorrect because PGP, Pretty Good Privacy, brings security to email through the use of a symmetric cipher, such as IDEA, to encipher the message. RSA is used for symmetric key exchange and for digital signatures. PGP is not an augmentation of MIMe. RFC 2440 permits other algorithms to be used in PGP. In order of preference, they are ElGamal and RSAfor key distribution; triple DES, IDEAand CAST5 for encryption of messages; DSA and RSA for digital signatures and SHA-1 or MD5 for generating hashes of the messages. Answer d is incorrect because there is no such protocol. There is a protocol called SET for Secure Electronic Transaction. It was developed by Visa and MasterCard to secure electronic bankcard transactions. SET requests authorization for payment and requires certificates binding a person's public key to their identity.

In a multilevel security system (MLS), the Pump is: A. A one-way information flow device B. A two-way information flow device C. A device that implements role-based access control D. Compartmented Mode Workstation (CMW)

Answer: A The Pump (M.h. Kang, I.S. Moskowitz, APump for Rapid, Reliable, Secure Communications, The 1st ACM Conference on Computer and Communications Security, Fairfax, VA, 1993) was developed at the US Naval Research Laboratory (NRL). It permits information flow in one direction only, from a lower level of security classification or sensitivity to a higher level. It is a convenient approach to multilevel security in that it can be used to put together systems with different security levels. * Answer "A two-way information flow device" is a distracter. * Answer "Compartmented Mode Workstation (CMW)", the CMW, refers to windows-based workstations that require users to work with information at different classification levels. Thus, users may work with multiple windows with different classification levels on their workstations. When data is attempted to be moved from one window to another, mandatory access control policies are enforced. This prevents information of a higher classification from being deposited to a location of lower classification. * Answer "A device that implements role-based access control", role-based access control, is an access control mechanism and is now being considered for mandatory access control based on users' roles in their organizations.

Which of the following would NOT be a component of a general enterprise security architecture model for an organization? A. IT system auditing B. Consideration of all the items that comprise information security, including distributed systems, software, hardware, communications systems, and networks C. Information and resources to ensure the appropriate level of risk management D. A systematic and unified approach for evaluating the organization's information systems security infrastructure and defining approaches to implementation and deployment of information security controls

Answer: A The auditing component of the IT system should be independent and distinct from the information system security architecture for a system. * In answer "Information and resources to ensure the appropriate level of risk management", the resources to support intelligent risk management decisions include technical expertise, applicable evaluation processes, refinement of business objectives, and delivery plans. * Answer "Consideration of all the items that comprise information security, including distributed systems, software, hardware, communications systems, and networks" promotes an enterprisewide view of information system security issues. * For answer "A systematic and unified approach for evaluating the organization's information systems security infrastructure and defining approaches to implementation and deployment of information security controls", the intent is to show that a comprehensive security architecture model includes all phases involved in information system security including planning, design, integrating, testing, and production.

Which of the following is the best example of need-to-know? A. An operator does not know more about the system than the minimum required to do the job. B. An operator cannot generate and verify transactions alone. C. The operators' duties are frequently rotated. D. Two operators are required to work together to perform a task.

Answer: A The correct answer is "An operator does not know more about the system than the minimum required to do the job". Need-to-know means the operators are working in an environment that limits their knowledge of the system, applications, or data to the minimum elements that they require to perform their job. * Answer "Two operators are required to work together to perform a task" is dual-control * "The operators' duties are frequently rotated" is job rotation * answer "An operator cannot generate and verify transactions alone" is separation of duties.

Acryptographic attack in which portions of the ciphertext are selected for trial decryption while having access to the corresponding decrypted plaintext is known as what type of attack? A. Chosen ciphertext B. Adaptive chosen plaintext C. Known plaintext D. Chosen plaintext

Answer: A The correct answer is "Chosen ciphertext. In answer Known plaintext, the attacker has a copy of the plaintext corresponding to the ciphertext. Answer Chosen plaintext describes the situation where selected plaintext is encrypted and the output ciphertext is obtained. The adaptive chosen plaintext attack, answer "Adaptive chosen plaintext, is a form of chosen plaintext attack where the selection of the plaintext is altered according to previous results.

Which of the following is NOT a use of an audit trail? A. Collects information such as passwords or infrastructure configurations B. Enables the security practitioner to trace a transaction's history C. Provides information about additions, deletions, or modifications to the data D. Assists the monitoring function by helping to recognize patterns of abnormal user behavior

Answer: A The correct answer is "Collects information such as passwords or infrastructure configurations". Auditing should not be used to collect user's passwords. It is used for the other three examples, however.

The minimum information necessary on a digital certificate is: A. Name, public key, digital signature of the certifier B. Name, expiration date, public key C. Name, expiration date, digital signature of the certifier D. Name, serial number, private key

Answer: A The correct answer is "Name, public key, digital signature of the certifier", where the name of the individual is certified and bound to his/her public key. This certification is validated by the digital signature of the certifying agent. In answer a, the public key is not present to be bound to the person's name. * In answer "Name, public key, digital signature of the certifier" the public key and name are present, but there is no digital signature verifying that the public key belongs to the name. * Answer "Name, serial number, private key" is incorrect on a number of counts. First, the private key is never disclosed to the public and secondly, there is no digital signature.

Which one of the following is NOT a component of a CC Protection Profile? A. Product-specific security requirements B. Threats against the product that must be addressed C. Security objectives D. Target of Evaluation (TOE) description

Answer: A The correct answer is "Product-specific security requirements". Product-specific security requirements for the product or system are contained in the Security Target (ST). Additional items in the PP are: TOE security environment description Assumptions about the security aspects of the product's expected use Organizational security policies or rules Application notes Rationale

The MULTICS operating system is a classic example of: A. Ring protection system. B. Object orientation. C. An open system. D. Database security.

Answer: A The correct answer is "Ring protection system". Multics is based on the ring protection architecture.

Why is security an issue when a system is booted into single-user mode? A. The operating system is started without the security front-end loaded. B. The users cannot log in to the system, and they will complain. C. Backup tapes cannot be restored while in single-user mode. D. Proper forensics cannot be executed while in single-user mode.

Answer: A The correct answer is "The operating system is started without the security front-end loaded". When the operator boots the system in single-user mode, the user front-end security controls are not loaded. This mode should be used for recovery and maintenance procedures only, and all operations should be logged and audited.

In the access control matrix, the rows are: A. Capability lists. B. Tuples. C. Access Control Lists (ACLs). D. Domains.

Answer: A The correct answer is Capability lists. * Answer "Access Control Lists (ACLs)" is incorrect because the access control list is not a row in the access control matrix. * Answer Tuples is incorrect because a tuple is a row in the table of a relational database. * Answer Domains is incorrect because a domain is the set of allowable values a column or attribute can take in a relational database.

Which one of the following is NOT a security mode of operation in an information system? A. Contained B. System high C. Multilevel D. Dedicated

Answer: A The correct answer is Contained, a distracter. * In the system high mode the information system operates at the highest level of information classification. In this mode, all users must have security clearances for the highest level of classified information. * Answer the dedicated mode requires that all users must have a clearance or an authorization and a need-to-know for all information that is produced by the information system. * The multi-level mode of operation, answer c, supports users with different clearances and data at multiple classification levels.

Processes are placed in a ring structure according to: A. Least privilege. B. Separation of duty. C. First in, first out. D. Owner classification.

Answer: A The correct answer is Least privilege. A process is placed in the ring that gives it the minimum privileges necessary to perform its functions.

A key schedule is: A. A set of subkeys derived from a secret key B. A method of generating keys by the use of random numbers C. Using distributed computing resources to conduct a brute force attack on a symmetric algorithm D. A list of cryptographic keys to be used at specified dates and times

Answer: A The subkeys are typically used in iterated block ciphers. In this type of cipher, the plaintext is broken into fixed-length blocks and enciphered in rounds. In a round, the same transformation is applied using one of the subkeys of the key schedule.

The Rijndael Cipher employs a round transformation that is comprised of three layers of distinct, invertible transformations. These transformations are also defined as uniform, which means that every bit of the State is treated the same. Which of the following is NOT one of these layers? A. The key inversion layer, which provides confusion through the multiple rounds B. The non-linear layer, which is the parallel application of S-boxes that have the optimum worst-case non-linearity properties C. The linear mixing layer, which provides a guarantee of the high diffusion of multiple rounds D. The key addition layer, which is an Exclusive Or of the Round Key to the intermediate State

Answer: A This answer is a distracter and does not exist.

The algorithm of the 802.11 Wireless LAN Standard that is used to protect transmitted information from disclosure is called: A. Wired Equivalency Privacy (WEP) B. Wireless Transaction Protocol (WTP) C. Wireless Application Environment (WAE) D. Wireless Transport Layer Security Protocol (WTLS)

Answer: A WEP is designed to prevent the violation of the confidentiality of data transmitted over the wireless LAN. Another feature of WEP is to prevent unauthorized access to the network. The other answers are protocols in the Wireless Application Protocol, the security.

What process is used to accomplish high-speed data transfer between a peripheral device and computer memory, bypassing the Central Processing Unit (CPU)? A. Direct memory access B. Interrupt processing C. Transfer under program control D. Direct access control

Answer: A With DMA, a DMAcontroller essentially takes control of the memory busses and manages the data transfer directly. Answer interrupt processing involves an external signal interrupting the normal CPU program flow. This interrupt causes the CPU to halt processing and jump to another program that services the interrupt. When the interrupt has been serviced, the CPU returns to continue executing the original program. Program control transfer, answer c, is accomplished by the processor executing input/output (I/O) instructions. Answer Direct access control is a distracter.

A 1999 law that addresses privacy issues related to health care, insurance and finance and that will be implemented by the states is: A. Kennedy-Kassebaum B. Gramm-Leach-Bliley (GLB) C. Insurance Reform Act D. Medical Action Bill

Answer: B

Increasing performance in a computer by overlapping the steps of different instructions is called: A. Areduced instruction set computer. B. Pipelining. C. Acomplex instruction set computer. D. Vector processing.

Answer: B

Mandatory access controls first appear in the Trusted Computer System Evaluation Criteria (TCSEC) at the rating of: A. D B. B C. C D. A

Answer: B

Memory space insulated from other running processes in a multiprocessing system is part of a: A. Least upper bound. B. Protection domain. C. Constrained data item. D. Security perimeter.

Answer: B

The * (star) property of the Biba model states that: A. Subjects cannot read from a higher level of integrity relative to their level of integrity. B. Subjects cannot write to a higher level of integrity relative to their level of integrity. C. Subjects cannot read from a lower level of integrity relative to their level of integrity. D. Subjects cannot write to a lower level of integrity relative to their level of integrity.

Answer: B

What is a programmable logic device (PLD)? A. Random Access Memory (RAM) that contains the software to perform specific tasks B. An integrated circuit with connections or internal logic gates that can be changed through a programming process C. A volatile device D. A program resident on disk memory that executes a specific function

Answer: B * Answer A volatile device is incorrect because a PLD is non-volatile. * Answer "Random Access Memory (RAM) that contains the software to perform specific tasks" is incorrect because random access memory is volatile memory that is not a nonvolatile logic device. * Answer "A program resident on disk memory that executes a specific function" is a distracter.

In communications between two parties, encrypting the hash function of a message with a symmetric key algorithm is equivalent to: A. Providing for secrecy of the message B. Generating a keyed Message Authentication Code (MAC) C. Generating a digital signature D. Generating a one-way function

Answer: B A MAC is used to authenticate files between users. If the sender and receiver both have the secret key, they are the only ones that can verify the hash function. If a symmetric key algorithm is used to encrypt the one-way hash function, then the one-way hash function becomes a keyed MAC. Answer "Generating a digital signature" is incorrect because a digital signature between two parties uses an asymmetric key algorithm. If a message is encrypted with the sender's private key, then only the sender's public key can decrypt the message. This proves that the message was sent by the sender since only the sender knows the private key. In practice, asymmetric key encryption is very slow, especially for long messages. Therefore, a one-way hash of the message is encrypted with the sender's private key instead of encrypting the complete message. Then, the message and the encrypted hash are sent to a second party. The receiver takes the encrypted hash and decrypts it with the sender's public key. Then, the receiver takes the hash of the message, using the same one-way hash algorithm as the sender. The hash generated by the receiver is compared with the decrypted hash sent with the message. If the two hashes are identical, the digital signature is validated. Note that his method also will reveal if the message was changed en route, since the hash calculated by the receiver will, then, be different from the encrypted hash sent along with the message. Answer "Providing for secrecy of the message" is incorrect since encrypting the hash of the message and sending the message in the clear does nothing to protect the confidentiality of the message. Since the hash function is a one-way function, the message cannot be recovered from its hash. Answer "Generating a one-way function" is incorrect since encrypting a hash of a message is not a one-way function. If it were, it would be of no use since no one would be able to reverse the process and decrypt it.

Which firewall type below uses a dynamic state table to inspect the content of packets? A. An application-level firewall B. A stateful-inspection firewall C. A circuit-level firewall D. A packet-filtering firewall

Answer: B A stateful-inspection firewall intercepts incoming packets at the Network level, then uses an Inspection Engine to extract state-related information from upper layers. It maintains the information in a dynamic state table and evaluates subsequent connection attempts. * packet-filtering firewall is the simplest type of firewall commonly implemented on routers. It operates at the Network layer and offers good performance but is the least secure. * application-level firewall or application-layer gateway, is more secure because it examines the packet at the application layer, but at the expense of performance. * circuit-level firewall, is similar to the application-level firewall in that it functions as a proxy server, but differs in that special proxy application software is not needed. Sources: Hacker Proof by Lars Klander (Jamsa Press, 1997) and Checkpoint Firewall-1 Stateful Inspection Technology (www.checkpoint.com).

Digital cash refers to the electronic transfer of funds from one party to another. When digital cash is referred to as anonymous or identified, it means that: A. Anonymous the identity of the bank is withheld; Identified the identity of the bank is not withheld B. Anonymous the identity of the cash holder is not known; Identified the identity of the cash holder is known C. Anonymous the identity of the cash holder is not known; Identified the identity of the merchant is known D. Anonymous the identity of merchant is withheld; Identified the identity of the merchant is not withheld

Answer: B Anonymous implementations of digital cash do not identify the cash holder and use blind signature schemes; identified implementations use conventional digital signatures to identify the cash holder. In looking at these two approaches, anonymous schemes are analogous to cash since cash does not allow tracing of the person who made the cash payment while identified approaches are the analog of credit or debit card transactions.

Which utility below can create a server-spoofing attack? A. DNS poisoning B. C2MYAZZ C. BO2K D. Snort

Answer: B C2MYAZZ is a utility that enables server spoofing to implement a session highjacking or man-in-the-middle exploit. It intercepts a client LANMAN authentication logon and obtains the session's logon credentials and password combination, transparently to the user. * DNS poisoning is also known as cache poisoning. It is the process of distributing incorrect IP address information for a specific host with the intent to divert traffic from its true destination. * Snort, is a utility used for network sniffing. Network sniffing is the process of gathering traffic from a network by capturing the data as it passes and storing it to analyze later. * Back Orifice 2000 (BO2K), is an application-level Trojan Horse used to give an attacker backdoor network access.

Which type of cabling below is the most common type for recent Ethernet installations? A. Twinax B. Twisted Pair C. ThickNet D. ThinNet

Answer: B Category 5 Unshielded Twisted Pair (UTP) is rated for very high data throughput (100 Mbps) at short distances (up to 100 meters), and is the standard cable type for Ethernet installations. * ThickNet, also known as 10Base5, uses traditional thick coaxial (coax) cable at data rates of up to 10 Mbps. * ThinNet, uses a thinner gauge coax, and is known as 10Base2. It has a shorter maximum segment distance than ThickNet, but is less expensive to install (also known as CheaperNet). * Twinax, is like ThinNet, but has two conductors, and was used in IBM Systems 36 and earlier AS/400 installations.

The two categories of the policy of separation of duty are: A. Dual control and aggregation control B. Dual control and functional separation C. Span of control and functional separation D. Inference control and functional separation

Answer: B Dual control requires that two or more subjects act together simultaneously to authorize an operation. A common example is the requirement that two individuals turn their keys simultaneously in two physically separated areas to arm a weapon. Functional separation implies a sequential approval process such as requiring the approval of a manager to send a check generated by a subordinate. * Answer "Span of control and functional separation" is incorrect. Span of control refers to the number of subordinates that can be optimally managed by a superior. * Answer "Inference control and functional separation" is incorrect. Inference control is implementing protections that prevent the inference of information not authorized to a user from information that is authorized to be accessed by a user. * Answer "Dual control and aggregation control" is incorrect, but aggregation refers to the acquisition of large numbers of data items to obtain information that would not be available by analyzing a small number of the data items.

Which of the following is NOT a key recovery method? A. A secret key or a private key is broken into a number of parts and each part is deposited with a trustee agent. The agents can then provide their parts of the key to a central authority, when presented with appropriate authorization. The key can then be reconstructed and used to decrypt messages encrypted with that key. B. A message is encrypted with a session key and the session key is, in turn, encrypted with the private key of a trustee agent. The encrypted session key is sent along with the encrypted message. The trustee, when authorized, can then decrypt the message by recovering the session key with the trustee's public key. C. A message is encrypted with a session key. The session key, in turn, is broken into parts and each part is encrypted with the public key of a different trustee agent. The encrypted parts of the session key are sent along with the encrypted message. The trustees, when authorized, can then decrypt their portion of the session key and provide their respective parts of the session key to a central agent. The central agent can then decrypt the message by reconstructing the session key from the individual components. D. A message is encrypted with a session key and the session key is, in turn, encrypted with the public key of a trustee agent. The encrypted session key is sent along with the encrypted message. The trustee, when authorized, can then decrypt the message by recovering the session key with the trustee's private key.

Answer: B Encrypting parts of the session key with the private keys of the trustee agents provides no security for the message since the message can be decrypted by recovering the key components of the session key using the public keys of the respective agents. These public keys are available to anyone. The other answers are valid means of recovering keys, since key recovery refers to permitting access to encrypted messages under predefined circumstances. Two of these answers are also called key encapsulation since the session key is encapsulated in the public keys of the trustee agents and, therefore, can be decrypted only by these trustee agents with their private keys.

Which of the following is NOT a characteristic of a cryptographic hash function, H (m), where m denotes the message being hashed by the function H? A. H (m) is a one-way function. B. H (m) is difficult to compute for any given m. C. The output is of fixed length. D. H (m) is collision free.

Answer: B For a cryptographic hash function, H (m) is relatively easy to compute for a given m. * Answer "H (m) is collision free" is a characteristic of a good cryptographic hash function, in that collision free means that for a given message, M, that produces H (M) = Z, it is computationally infeasible to find another message, M1, such that H (M1) = Z. * Answer "The output is of fixed length" is part of the definition of a hash function since it generates a fixed-length result that is independent of the length of the input message. This characteristic is useful for generating digital signatures since the signature can be applied to the fixed-length hash that is uniquely characteristic of the message instead of to the entire message, which is usually much longer than the hash. * Answer "H (m) is a one-way function" relates to answer "H (m) is difficult to compute for any given m" in that a one-way function is difficult or impossible to invert. This means that for a hash function H (M) = Z, it is computationally infeasible to reverse the process and find M given the hash Z and the function H.

Which of the following is an example of least privilege? A. An operator cannot generate and verify transactions alone. B. An operator does not have more system rights than the minimum required to do the job. C. An operator does not know more about the system than the minimum required to do the job. D. The operators' duties are frequently rotated.

Answer: B Least Privilege embodies the concept that users or operators should be granted the lowest level of system access or system rights that allows them to perform their job. * Answer "An operator does not know more about the system than the minimum required to do the job" is need-to-know * "The operators' duties are frequently rotated" is job rotation * "An operator cannot generate and verify transactions alone" is separation of duties.

Which choice below denotes a packet-switched connectionless wide area network (WAN) technology? A. ATM B. SMDS C. X.25 D. Frame Relay

Answer: B Switched Multimegabit Data Service (SMDS) is a high-speed, connectionless, packet-switching public network service that extends LAN-like performance to a metropolitan area network (MAN) or a wide area network (WAN). It's generally delivered over a SONET ring with a maximum effective service radius of around 30 miles. * X.25, defines an interface to the first commercially successful connection-oriented packet-switching network, in which the packets travel over virtual circuits. * Frame Relay, was a successor to X.25, and offers a connection-oriented packet-switching network. * Asynchronous Transfer Mode (ATM), was developed from an outgrowth of ISDN standards, and is fast-packet, connection-oriented, cell-switching technology.

The Advanced Encryption Standard, the Rijndael cipher, can be described as: A. A recursive, sequential cipher B. An iterated block cipher C. As treaming block cipher D. A Feistel network

Answer: B The correct answer is "An iterated block cipher". Answers A recursive, sequential cipher, A Feistel network, and As treaming block cipher are distracters; however, answer A Feistel network characterizes the Data Encryption Standard (DES) cipher.

How do covert timing channels convey information? A. By generating noise and traffic with the data B. By modifying the timing of a system resource in some measurable way C. By changing a system's stored data characteristics D. By performing a covert channel analysis

Answer: B The correct answer is "By modifying the timing of a system resource in some measurable way". A covert timing channel alters the timing of parts of the system to enable it to be used to communicate information covertly (outside the normal security function). * Answer "By changing a system's stored data characteristics" is the description of the use of a covert storage channel. * "By generating noise and traffic with the data" is a technique to combat the use of covert channels. * Answer "By performing a covert channel analysis" is the Orange Book requirement for B3, B2, and A1 evaluated systems.

Elliptic curve cryptosystems: A. Cannot be used to implement digital signatures. B. Have a higher strength per bit than an RSA. C. Cannot be used to implement encryption. D. Have a lower strength per bit than an RSA.

Answer: B The correct answer is "Have a higher strength per bit than an RSA". It is more difficult to compute Elliptic Curve discreet logarithms than conventional discreet logarithms or factoring. Smaller key sizes in the elliptic curve implementation can yield higher levels of security. Therefore, answer "Have a lower strength per bit than an RSA" is incorrect. Answers "Cannot be used to implement digital signatures" and "Cannot be used to implement encryption" are incorrect because elliptic curve cryptosystems can be used for digital signatures and encryption.

Which of the following is a reason to institute output controls? A. To preserve the integrity of the data in the system while changes are being made to the configuration B. To protect the output's confidentiality C. To recover damage after an identified system failure D. To detect irregularities in the software's operation

Answer: B The correct answer is "To protect the output's confidentiality". In addition to being used as a transaction control verification mechanism, output controls are used to ensure that output, such as printed reports, is distributed securely. * Answer "To preserve the integrity of the data in the system while changes are being made to the configuration" is an example of Configuration or Change control. * "To detect irregularities in the software's operation" is an example of Application controls, and d is an example of Recovery controls.

Which of the following does the Clark-Wilson model NOT involve? A. Well-formed transactions B. Confidentiality items C. Transformational procedures D. Constrained data items

Answer: B The correct answer is Confidentiality items. The other answers are parts of the Clark- Wilson model.

An audit trail is an example of what type of control? A. Application control B. Detective control C. Deterrent control D. Preventative control

Answer: B The correct answer is Detective control. An audit trail is a record of events to piece together what has happened and allow enforcement of individual accountability by creating a reconstruction of events. They can be used to assist in the proper implementation of the other controls, however.

For a given hash function H, to prevent substitution of a message M1 for a message M2, it is necessary that: A. H(M1) = H(M2) B. H(M1) <> H(M2) C. H(M1) < H(M2) D. H(M1) > H(M2)

Answer: B The correct answer is H(M1) <> H(M2). If H(M1) = H(M2) then the message digests of both M1 and M2 would be equal, and one would not know that one message was substituted for the other. The other answers are distracters.

A Security Parameter Index (SPI) and the identity of the security protocol (AH or ESP) are the components of: A. SSL B. IPSec C. S-HTTP D. SSH-2

Answer: B The correct answer is IPSec. The SPI, AH and/or ESP and the destination IP address are components of an IPSec Security Association (SA.) The other answers describe protocols other than IPSec.

Which of the following is NOT a key management issue? A. Key storage B. Key exchange C. Key change D. Key recovery

Answer: B The correct answer is Key exchange. The other answers are key management issues, but key exchange is a function of the encryption system.

Which algorithm is used in the Clipper Chip? A. IDEA B. SKIPJACK C. 3 DES D. DES

Answer: B The correct answer is SKIPJACK. The other options are other symmetric key algorithms.

Aprocessor in which a single instruction specifies more than one CONCURRENT operation is called: A. Pipelined processor. B. Very Long Instruction Word processor. C. Scalar processor. D. Superscalar processor.

Answer: B The correct answer is Very Long Instruction Word processor. * A pipelined processor overlaps the steps of different instructions. * Answer a superscalar processor performs a concurrent execution of multiple instructions in the same pipeline stage. * A scalar processor executes one instruction at a time.

The vulnerability associated with the requirement to change security protocols at a carriers' Wireless Application Protocol (WAP) gateway from the Wireless Transport Layer Security Protocol (WTLS) to SSL or TLS over the wired network is called: A. Wired Equivalency Privacy (WEP) Gap. B. Wireless Application Protocol (WAP) Gap. C. Wireless Transaction Protocol (WTP) Gap. D. Wireless Transport Layer Security Protocol (WTLS) Gap.

Answer: B The correct answer is the WAP Gap. The other answers are distracters.

What is the correct sequence which enables an authorized agency to use the Law Enforcement Access Field (LEAF) to decrypt a message sent by using the Clipper Chip? The following designations are used for the respective keys involved Kf, the family key; Ks, the session key; U, a unique identifier for each Clipper Chip and Ku, the unit key that is unique to each Clipper Chip. A. Decrypt the LEAF with the family key, Kf; recover U; obtain a court order to obtain Ks, the session key. Use the session key to decrypt the message. B. Decrypt the LEAF with the family key, Kf; recover U; obtain a court order to obtain the two halves of Ku; recover Ku; and then recover Ks, the session key. Use the session key to decrypt the message. C. Obtain a court order to acquire the family key, Kf; recover U and Ku; then recover Ks, the session key. Use the session key to decrypt the message. D. Obtain a court order to acquire the two halves of Ku, the unit key. Recover Ku. Decrypt the LEAF with Ku and then recover Ks, the session key. Use the session key to decrypt the message.

Answer: B The explanation is based on the LEAF as shown in the Figure. The message is encrypted with the symmetric session key, Ks. In order to decrypt the message, then, Ks must be recovered. The LEAF contains the session key, but the LEAF is encrypted with the family key, Kf , that is common to all Clipper Chips. The authorized agency has access to Kf and decrypts the LEAf. However, the session key is still encrypted by the 80-bit unit key, Ku, that is unique to each Clipper Chip and is identified by the unique identifier, U. Ku is divided into two halves, and each half is deposited with an escrow agency. The law enforcement agency obtains the two halves of Ku by presenting the escrow agencies with a court order for the key identified by U. The two halves of the key obtained by the court order are XORed together to obtain Ku. Then, Ku is used to recover the session key, Ks, and Ks is used to decrypt the message. The decryption sequence to obtain Ks can be summarized as: This is the sequence described in answer "Decrypt the LEAF with the family key, Kf; recover U; obtain a court order to obtain the two halves of Ku; recover Ku; and then recover Ks, the session key. Use the session key to decrypt the message". The sequences described in the other answers are incorrect.

In a digitally-signed message transmission using a hash function, A. The message digest is encrypted in the public key of the sender. B. The message digest is encrypted in the private key of the sender. C. The message is encrypted in the private key of the sender. D. The message is encrypted in the public key of the sender.

Answer: B The hash function generates a message digest. The message digest is encrypted with the private key of the sender. Thus, if the message can be opened with the sender's public key that is known to all, the message must have come from the sender. The message is not encrypted with the public key because the message is usually longer than the message digest and would take more computing resources to encrypt and decrypt. Because the message digest uniquely characterizes the message, it can be used to verify the identity of the sender. Answers "The message digest is encrypted in the public key of the sender" and "The message is encrypted in the public key of the sender" will not work because a message encrypted in the public key of the sender can only be read by using the private key of the sender. Because the sender is the only one who knows this key, no one else can read the message. Answer "The message is encrypted in the private key of the sender" is incorrect because the message is not encrypted, but the message digest is encrypted.

The main objective of the Java Security Model ( JSM) is to: A. Provide accountability for events B. Protect the user from hostile, network mobile code C. Protect the local client from user-input hostile code D. Protect a web server from hostile, client code

Answer: B When a user accesses a Web page through a browser, class files for an applet are downloaded automatically, even from untrusted sources. To counter this possible threat, Java provides a customizable sandbox to which the applets' execution is confined. This sandbox provides such protections as preventing reading and writing to a local disk, prohibiting the creation of a new process, prevention of making a network connection to a new host and preventing the loading of a new dynamic library and directly calling a native method. The sandbox security features are designed into the Java Virtual Machine (JVM). These features are implemented through array bounds checking, structured memory access, type-safe reference cast checking to ensure that casting to an object of a different type is valid, and checking for null references and automatic garbage collection. These checks are designed to limit memory accesses to safe, structured operations. The other answers are distracters.

In a block cipher, diffusion: A. Conceals the connection between the ciphertext and plaintext B. Is usually implemented by non-linear S-boxes C. Spreads the influence of a plaintext character over many ciphertext characters D. Cannot be accomplished

Answer: C

The Escrowed Encryption Standard describes the: A. Rijndael Cipher. B. Fair Public Key Cryptosystem. C. Clipper Chip. D. Digital certificates.

Answer: C

Which of the following are the three types of NIACAP accreditation? A. Site, type, and general B. Type, system, and location C. Site, type, and system D. Site, type, and location

Answer: C

The following concerns usually apply to what type of architecture? Desktop systems can contain sensitive information that may be at risk of being exposed. Users may generally lack security awareness. Modems present a vulnerability to dial-in attacks. Lack of proper backup may exist. A. Centralized B. Open system C. Distributed D. Symmetric

Answer: C Additional concerns associated with distributed systems include: A desktop PC or workstation can provide an avenue of access into critical information systems of an organization. Downloading data from the Internet increases the risk of infecting corporate systems with a malicious code or an unintentional modification of the databases. A desktop system and its associated disks may not be protected from physical intrusion or theft. * For answer centralized system all the characteristics cited do not apply to a central host with no PCs or workstations with large amounts of memory attached. Also, the vulnerability presented by a modem attached to a PC or workstation would not exist. * An open system or architecture is comprised of vendorindependent subsystems that have published specifications and interfaces in order to permit operations with the products of other suppliers. One advantage of an open system is that it is subject to review and evaluation by independent parties. * Answer Symmetric is a distracter.

What BEST describes the National Security Agency-developed Capstone? A. A one-way function for implementation of public key encryption B. A device for intercepting electromagnetic emissions C. A chip that implements the US Escrowed Encryption Standard D. The PC Card implementation of the Clipper Chip system

Answer: C Capstone is a Very Large Scale Integration (VLSI) chip that employs the Escrowed Encryption Standard and incorporates the Skipjack algorithm, similar to the Clipper Chip. As such, it has a LEAf. Capstone also supports public key exchange and digital signatures. At this time, Capstone products have their LEAF function suppressed and a Certifying Authority provides for key recovery. *Answer "A device for intercepting electromagnetic emissions" is then, obviously, incorrect. For information purposes, though, the US Government program to study and control the interception of electromagnetic emissions that may compromise classified information is called TEMPEST. * Answer "The PC Card implementation of the Clipper Chip system" is also, obviously, incorrect. However, Capstone was first implemented on a PC card called Fortezza. * Answer "A one-way function for implementation of public key encryption" is incorrect since Capstone is not a mathematical function, but it incorporates mathematical functions for key exchange, authentication and encryption.

Which type of routing below commonly broadcasts its routing table information to all other routers every minute? A. Dynamic Control Protocol Routing B. Static Routing C. Distance Vector Routing D. Link State Routing

Answer: C Distance vector routing uses the routing information protocol (RIP) to maintain a dynamic table of routing information that is updated regularly. It is the oldest and most common type of dynamic routing. * static routing, defines a specific route in a configuration file on the router and does not require the routers to exchange route information dynamically. * link state routers, functions like distance vector routers, but only use firsthand information when building routing tables by maintaining a copy of every other router's Link State Protocol (LSP) frame. This helps to eliminate routing errors and considerably lessens convergence time. *Answer Dynamic Control Protocol Routing is a distracter.

Which choice below does NOT accurately describe the difference between multi-mode and single-mode fiber optic cabling? A. Multi-mode fiber propagates light waves through many paths, single-mode fiber propagates a single light ray only. B. Both types have a longer allowable maximum transmission distance than UTP Cat 5. C. Multi-mode fiber has a longer allowable maximum transmission distance than single-mode fiber. D. Single-mode fiber has a longer allowable maximum transmission distance than multi-mode fiber.

Answer: C Multi-mode fiber has a shorter allowable maximum transmission distance than single-mode fiber (2km vs. 10km). Multi-mode transmits the light through several different paths in the cable, whereas single-mode uses one light path, making single mode perform better. However, multi-mode is less expensive to install and is used more often in short-to-medium haul networks. Category 5 unshielded twisted pair (UTP) has a maximum transmission distance of 100 meters. Sources: Catalyst 5000 Series Installation Guide (Cisco Systems, 1996) and Gigabit Ethernet by Jayant Kadambi, Ian Crayford, and Mohan Kalkunte (Prentice Hall PTR, 1998).

Which of the following statements BEST describes the Public Key Cryptography Standards (PKCS)? A. A set of public-key cryptography standards that support only standard algorithms such as Diffie-Hellman and RSA B. A set of public-key cryptography standards that support only algorithm-independent implementations C. A set of public-key cryptography standards that support algorithms such as Diffie-Hellman and RSA as well as algorithm independent standards D. A set of public-key cryptography standards that support encryption algorithms such as Diffie-Hellman and RSA, but does not address digital signatures

Answer: C PKCS supports algorithm-independent and algorithm-specific implementations as well as digital signatures and certificates. It was developed by a consortium including RSA Laboratories, Apple, DEC, Lotus, Sun, Microsoft and MIT. At this writing, there are 15 PKCS standards. Examples of these standards are: PKCS #1. Defines mechanisms for encrypting and signing data using the RSA public-key system PKCS #3. Defines the Diffie-Hellman key agreement protocol PKCS #10. Describes a syntax for certification requests PKCS #15. Defines a standard format for cryptographic credentials stored on cryptographic tokens.

Which of the following is NOT an issue with secret key cryptography? A. Compromise of the keys can enable the attacker to impersonate the key owners and, therefore, read and send false messages. B. A networked group of m users with separate keys for each pair of users will require m (m-1)/2 keys. C. Security of the certification authority. D. Secure distribution of the keys.

Answer: C The CAis used in public key cryptography, not secret key cryptography. A CA will certify that a public key actually belongs to a specific individual and that the information associated with the individual's key is valid and correct. The CA accomplishes this certification by digitally signing the individual's public key and associated information. The certification professes to another person who wants to send a message to this individual using public key encryption that the public key actually belongs to the intended individual. The Consultation Committee, International Telephone and Telegraph, International Telecommunications Union (CCITT-ITU)/ International Organization for Standardization (ISO) X.509 Authentication framework defines a format for public key certificates. This structure is outlined in Figure. Answer "A networked group of m users with separate keys for each pair of users will require m (m-1)/2 keys" is an important issue in secret key cryptography; therefore it is not the correct answer. If, among a network of m users, each user wants to have secure communications with every other user on the network, then there must be a secret key for each pair of potential users. This concept can be illustrated with five users as shown in Figure. Thus, with five users, the number of independent keys is equal to (5 x 4)/2 or 10 as depicted by the ten connecting lines in Figure A.6. *answer "Secure distribution of the keys" is incorrect since securely distributing the keys to all users is, obviously, a very important requirement. Answer d is incorrect since a compromise of the keys can, indeed, enable the attacker to impersonate the key owners and, therefore, read and send false messages.

Which of the following is true? A. No successful attacks have been reported against double DES. B. The work factor of single DES is the same as for triple DES. C. The work factor of double DES is the same as for single DES. D. The work factor of triple DES is the same as for double DES.

Answer: C The Meet-in-the-Middle attack has been successfully applied to double DES, and the work factor is equivalent to that of single DES. Thus, answer "No successful attacks have been reported against double DES" is incorrect. Answer "The work factor of triple DES is the same as for double DES" is false because the work factor of triple DES is greater than that for double DES. In triple DES, three levels of encryption and/or decryption are applied to the message. The work factor of double DES is equivalent to the work factor of single DES. Answer "The work factor of single DES is the same as for triple DES" is false because the work factor of single DES is less than for triple DES. In triple DES, three levels of encryption and/or decryption are applied to the message in triple DES.

The Secure Hash Algorithm (SHA) is specified in the: A. Data Encryption Standard. B. Advanced Encryption Standard. C. Digital Signature Standard. D. Digital Encryption Standard.

Answer: C The correct answer is "Digital Signature Standard". *Answer "Data Encryption Standard" refers to DES, a symmetric encryption algorithm. * answer "Digital Encryption Standa" is a distracter there is no such term; * answer "Advanced Encryption Standard" is the Advanced Encryption Standard, which has replaced DES and is now the Rijndael algorithm.

Which of the following is a problem with symmetric key encryption? A. Work factor is not a function of the key size. B. Most algorithms are kept proprietary. C. Secure distribution of the secret key. D. It is slower than asymmetric key encryption.

Answer: C The correct answer is "Secure distribution of the secret key". Answer "It is slower than asymmetric key encryption" is incorrect because the opposite is true; answer "Most algorithms are kept proprietary" is incorrect because most symmetric key algorithms are published; and answer "Work factor is not a function of the key size" is incorrect because work factor is a function of key size. The larger the key is, the larger the work factor.

Separation of duties embodies what principle? A. The operators' duties are frequently rotated. B. Two operators are required to work in tandem to perform a task. C. The operators have different duties to prevent one person from compromising the system. D. An operator does not know more about the system than the minimum required to do the job.

Answer: C The correct answer is "The operators have different duties to prevent one person from compromising the system". Separation of duties means that the operators are prevented from generating and verifying transactions alone, for example. A task might be divided into different smaller tasks to accomplish this, or in the case of an operator with multiple duties, the operator makes a logical, functional job change when performing such conflicting duties. Answer "An operator does not know more about the system than the minimum required to do the job" is need-to-know, answer "Two operators are required to work in tandem to perform a task" is dual-control, and c is job rotation.

The Secure Hash Algorithm (SHA-1) of the Secure Hash Standard (NIST FIPS PUB 180) processes data in block lengths of: A. 128 bits. B. 256 bits. C. 512 bits. D. 1024 bits.

Answer: C The correct answer is 512 bits. If a block length is fewer than 512 bits, padding bits are added to make the block length equal to 512 bits. The other answers are distracters.

Which of the following is an example of an asymmetric key algorithm? A. IDEA B. 3 DES C. ELLIPTIC CURVE D. DES

Answer: C The correct answer is ELLIPTIC CURVE. All the other answers refer to symmetric key algorithms.

The addressing mode in a digital computer in which the address location that is specified in the program instructions contains the address of the final desired location is called: A. Indexed addressing. B. Absolute addressing. C. Indirect addressing. D. Implied addressing.

Answer: C The correct answer is Indirect addressing. * Answer indexed addressing determines the desired memory address by adding the contents of the address defined in the program's instruction to that of an index register. * Implied addressing refers to registers usually contained inside the CPU. * Answer absolute addressing addresses the entire primary memory space.

Convert Channel Analysis, Trusted Facility Management, and Trusted Recovery are parts of which book in the TCSEC Rainbow Series? A. Red Book B. Dark Green Book C. Orange Book D. Green Book

Answer: C The correct answer is Orange Book. * Answer the Red Book is the Trusted Network Interpretation (TNI) summary of network requirements (described in the Telecommunications and Network Security domain). * The Green Book, is the Department of Defense (DoD) Password Management Guide-line; * The Dark Green Book, is The Guide to Understanding Data Rema-nence in Automated Information Systems.

The boundary separating the TCB from the remainder of the system is called the: A. Star property. B. Discretionary control boundary. C. Security perimeter. D. Simple security property.

Answer: C The correct answer is Security perimeter. Answers Star property and Simple security property deal with security models and answer Discretionary control boundary is a distracter.

What does Secure Sockets Layer (SSL)/Transaction Security Layer (TSL) do? A. Implements confidentiality, authentication, and integrity below the Transport Layer B. Implements only confidentiality below the Transport Layer C. Implements confidentiality, authentication, and integrity above the TransportLayer D. Implements only confidentiality above the Transport Layer

Answer: C The correct answer is a by definition. Answer "Implements confidentiality, authentication, and integrity below the Transport Layer" is incorrect because SSL/TLS operates above the Transport Layer. Answer "Implements only confidentiality above the Transport Layer" is incorrect because authentication and integrity are provided also. Answer "Implements only confidentiality below the Transport Layer" is incorrect because it cites only confidentiality and SSL/TLS operates above the Transport Layer.

The Wired Equivalency Privacy algorithm (WEP) of the 802.11 Wireless LAN Standard uses which of the following to protect the confidentiality of information being transmitted on the LAN? A. A digital signature that is sent between a mobile station (e.g., a laptop with a wireless Ethernet card) and a base station access point B. A public/private key pair that is shared between a mobile station (e.g., a laptop with a wireless Ethernet card) and a base station access point C. A secret key that is shared between a mobile station (e.g., a laptop with a wireless Ethernet card) and a base station access point D. Frequency shift keying (FSK) of the message that is sent between a mobile station (e.g., a laptop with a wireless Ethernet card) and a base station access point

Answer: C The transmitted packets are encrypted with a secret key and an Integrity Check (IC) field comprised of a CRC-32 check sum that is attached to the message. WEP uses the RC4 variable key-size stream cipher encryption algorithm. RC4 was developed in 1987 by Ron Rivest and operates in output feedback mode. Researchers at the University of California at Berkely ([email protected]) have found that the security of the WEP algorithm can be compromised, particularly with the following attacks: Passive attacks to decrypt traffic based on statistical analysis Active attack to inject new traffic from unauthorized mobile stations, based on known plaintext Active attacks to decrypt traffic, based on tricking the access point Dictionary-building attack that, after analysis of about a day's worth of traffic, allows real-time automated decryption of all traffic The Berkeley researchers have found that these attacks are effective against both the 40-bit and the so-called 128-bit versions of WEP using inexpensive off-the-shelf equipment. These attacks can also be used against networks that use the 802.11b Standard, which is the extension to 802.11 to support higher data rates, but does not change the WEP algorithm. The weaknesses in WEP and 802.11 are being addressed by the IEEE 802.11i Working Group. WEP will be upgraded to WEP2 with the following proposed changes: Modifying the method of creating the initialization vector (IV) Modifying the method of creating the encryption key Protection against replays Protection against IV collision attacks Protection against forged packets In the longer term, it is expected that the Advanced Encryption Standard (AES) will replace the RC4 encryption algorithm currently used in WEP.

What is the simple security property of which one of the following models is described as: A user has access to a client company's information, c, if and only if for all other information, o, that the user can read, either x(c) z (o) or x(c) = x (o), where x(c) is the client's company and z (o) is the competitors of x(c). A. Bell-LaPadula B. Lattice C. Chinese wall D. Biba

Answer: C This model, (D.c. Brewer and M.j. Nash, Chinese Wall Model, Proceedings of the 1989 IEEE Computer Society Symposium on Security and Privacy, 1989), defines rules that prevent conflicts of interest in organizations that may have access to information from companies that are competitors of each other. Essentially, the model states that a user working on one account cannot work on a competitor's account for a designated period of time. Answer the Biba model is an integrity model that is an analog of the Bell-LaPadula confidentiality model of answer Bell-LaPadula. Answer the lattice refers to the general information flow model where security levels are represented by a lattice structure. The model defines a transitive ordering relation, , on security classes. Thus, for security classes X, Y, and Z, the ordering relation X Y Z describes the situation where Z is the highest security class and X is the lowest security class, and there is an ordering among the three classes.

The termination of selected, non-critical processing when a hardware or software failure occurs and is detected is referred to as: A. Fault tolerant. B. Fail safe. C. An exception. D. Fail soft.

Answer: D

The Advanced Encryption Standard (Rijndael) block cipher requirements regarding keys and block sizes have now evolved to which configuration? A. Both the key and block sizes can be 128, 192, and 256 bits each. B. The block size is 128 bits, and the key size is 128 bits. C. The key size is 128 bits, and the block size can be 128, 192, or 256 bits. D. The block size is 128 bits, and the key can be 128, 192, or 256 bits.

Answer: D AES is comprised of the three key sizes, 128, 192, and 256 bits with a fixed block size of 128 bits. The Advanced Encryption Standard (AES) was announced on November 26, 2001 , as Federal Information Processing Standard Publication (FIPS PUB 197). FIPS PUB 197 states that This standard may be used by Federal departments and agencies when an agency determines that sensitive (unclassified) information (as defined in P.L. 100-235) requires cryptographic protection. Other FIPS-approved cryptographic algorithms may be used in addition to, or in lieu of, this standard. Depending upon which of the three keys is used, the standard may be referred to as AES-128, AES-192 or AES-256. The number of rounds used in the Rijndael cipher is a function of the key size as follows: 256-bit key 14 rounds 192-bit key 12 rounds 128-bit key 10 rounds Rijndael has a symmetric and parallel structure that provides for flexibility of implementation and resistance to cryptanalytic attacks. Attacks on Rijndael would involve the use of differential and linear cryptanalysis.

The definition A relatively small amount (when compared to primary memory) of very high speed RAM, which holds the instructions and data from primary memory, that has a high probability of being accessed during the currently executing portion of a program refers to what category of computer memory? A. Secondary B. Virtual C. Real D. Cache

Answer: D Cache logic attempts to predict which instructions and data in main (primary) memory will be used by a currently executing program. It then moves these items to the higher speed cache in anticipation of the CPU requiring these programs and data. Properly designed caches can significantly reduce the apparent main memory access time and thus increase the speed of program execution. * Answer secondary memory is a slower memory (such as a magnetic disk) that provides non-volatile storage. * Real or primary memory is directly addressable by the CPU and is used for the storage of instructions and data associated with the program that is being executed. This memory is usually high-speed, Random Access Memory (RAM). * Answer virtual memory uses secondary memory in conjunction with primary memory to present the CPU with a larger, apparent address space of the real memory locations.

There are two fundamental security protocols in IPSEc. These are the Authentication Header (AH) and the Encapsulating Security Payload (ESP). Which of the following correctly describes the functions of each? A. ESP-data encrypting and source authenticating protocol that also validates the integrity of the transmitted data; AH-source authenticating protocol B. ESP-data encrypting and source authenticating protocol; AH-source authenticating protocol that also validates the integrity of the transmitted data C. ESP-data encrypting protocol that also validates the integrity of the transmitted data; AH-source authenticating protocol that also validates the integrity of the transmitted data D. ESP-data encrypting and source authenticating protocol that also validates the integrity of the transmitted data; AH-source authenticating protocol that also validates the integrity of the transmitted data

Answer: D ESP does have a source authentication and integrity capability through the use of a hash algorithm and a secret key. It provides confidentiality by means of secret key cryptography. DES and triple DES secret key block ciphers are supported by IPSEC and other algorithms will also be supported in the future. AH uses a hash algorithm in the packet header to authenticate the sender and validate the integrity of the transmitted data.

Which LAN topology below is MOST vulnerable to a single point of failure? A. FDDI B. Physical Star C. Logical Ring D. Ethernet Bus

Answer: D Ethernet bus topology was the first commercially viable network topology, and consists of all workstations connected to a single coaxial cable. Since the cable must be properly terminated on both ends, a break in the cable stops all communications on the bus. * the physical star topology acts like a logical bus, but provides better fault tolerance, as a cable break only disconnects the workstation or hub directly affected. * logical ring topology, is used by Token Ring and FDDI and is highly resilient. Token Ring employs a beacon frame, which, in case of a cable break, initiates auto reconfiguration and attempts to reroute the network around the failed mode. Also, the Token Ring active monitor station performs ring maintenance functions, like removing continuously circulating frames from the ring. FDDI employs a second ring to provide redundancy. Sources: Virtual LANs by Mariana Smith (McGraw-Hill, 1998) and Internetworking Technologies Handbook, Second Edition (Cisco Press, 1998).

The DES key size is: A. 128 bits. B. 56 bits. C. 512 bits. D. 64 bits.

Answer: D It is 64-bits, but 8 bits are used for parity, so it is 56 bits in effective for the key length. Might be good to note the clarification.

Which statement accurately describes the difference between 802.11b WLAN ad hoc and infrastructure modes? A. Access points are rarely used in 802.11b WLANs. B. The ad hoc mode requires an Access Point to communicate to the wired network. C. Wireless nodes can communicate peer-to-peer in the infrastructure mode. D. Wireless nodes can communicate peer-to-peer in the ad hoc mode.

Answer: D Nodes on an IEEE 802.11b wireless LANs can communicate in one of two modes: ad hoc or infrastructure. In ad hoc mode, the wireless nodes communicate directly with each other, without establishing a connection to an access point on a wired LAN. In infrastructure mode, the wireless nodes communicate to an access point, which operates similarly to a bridge or router and manages traffic between the wireless network and the wired network.

Which of the following terms is NOT associated with a Read Only Memory (ROM)? A. Field Programmable Gate Array (FPGA) B. Flash memory C. Firmware D. Static RAM (SRAM)

Answer: D Static Random Access Memory (SRAM) is volatile and, therefore, loses its data if power is removed from the system. Conversely, a ROM is nonvolatile in that it does not lose its content when power is removed. * Flash memories are a type of electrically programmable ROM. * Answer FPGA is a type of Programmable Logic Device (PLD) that is programmed by blowing fuse connections on the chip or using an antifuse that makes a connection when a high voltage is applied to the junction. * For answer firmware is a program that is stored on ROMs.

The standard process to certify and accredit A. DIACAP B. DITSCAP C. CIAP D. NIACAP E. Defense audit

Answer: D The NIACAP provides a standard set of activities, general tasks, and a management structure to certify and accredit systems that will maintain the information assurance and security posture of a system or site. The NIACAP is designed to certify that the information system meets documented accreditation requirements and will continue to maintain the accredited security posture throughout the system life cycle. * Answer CIAP is being developed for the evaluation of critical commercial systems and uses the NIACAP methodology. * DITSCAP establishes for the defense entities a standard process, set of activities, general task descriptions, and a management structure to certify and accredit IT systems that will maintain the required security posture. The process is designed to certify that the IT system meets the accreditation requirements and that the system will maintain the accredited security posture throughout the system life cycle. The four phases to the DITSCAP are Definition, Verification, Validation, and Post Accreditation. * Answer "Defense audit" is a distracter. * Answer DIACAP is a distracter.

Which choice below most accurately describes SSL? A. It's a widely used standard of securing e-mail at the Application level. B. It gives a user remote access to a command prompt across a secure, encrypted session. C. It uses two protocols, the Authentication Header and the Encapsulating Security Payload. D. It allows an application to have authenticated, encrypted communications across a network.

Answer: D The Secure Socket Layer (SSL) sits between higher-level application functions and the TCP/IP stack and provides security to applications. It includes a variety of encryption algorithms to secure transmitted data, but the functionality must be integrated into the application. Answer "It's a widely used standard of securing e-mail at the Application level." refers to the Secure/Multipurpose Internet Mail Extension (S/MIME). Most major e-mail clients support S/MIME today. Answer "It gives a user remote access to a command prompt across a secure, encrypted session." describes Secure Shell (SSH). Answer "It uses two protocols, the Authentication Header and the Encapsulating Security Payload." refers to IPSec. IPSec enables security to be built directly into the TCP/IP stack, without requiring application modification.

The IP address, 178.22.90.1, is considered to be in which class of address? A. Class D B. Class C C. Class A D. Class B

Answer: D The class A address range is 1.0.0.0 to 126.255.255.255. The class B address range is 128.0.0.0 to 191.255.255.255. The class C address range is from 192.0.0.0 to 223.255.255.255. The class D address range is 244.0.0.0 to 239.255.255.255, and is used for multicast packets. Sources: Designing Network Security by Merike Kaeo (Cisco Press, 1999) and CCNA Study Guide by Todd Lammle, Donald Porter, and James Chellis (Sybex, 1999).

Which of the following characteristics does a one-time pad have if used properly? A. The key has to be of greater length than the message to be encrypted. B. The key does not have to be random. C. It can be used more than once. D. It is unbreakable.

Answer: D The correct answer is "It is unbreakable". If the one-time-pad is used only once and its corresponding key is truly random and does not have repeating characters, it is unbreakable. Answer "It can be used more than once" is incorrect because if used properly, the one-time-pad should be used only once. Answer "The key does not have to be random" is incorrect because the key should be random. Answer "The key has to be of greater length than the message to be encrypted" is incorrect because the key has to be of the same length as the message.

In the Common Criteria, an implementation-independent statement of security needs for a set of IT security products that could be built is called a: A. Package. B. Security Target (ST). C. Target of Evaluation (TOE). D. Protection Profile (PP).

Answer: D The correct answer is "Protection Profile (PP)". Answer a, ST, is a statement of security claims for a particular IT product or system. * A Package is defined in the CC as an intermediate combination of security requirement components. * ATOE is an IT product or system to be evaluated.

Which one the following is NOT one of the three major parts of the Common Criteria (CC)? A. Introduction and General Model B. Security Assurance Requirements C. Security Functional Requirements D. Security Evaluation Requirements

Answer: D The correct answer is "Security Evaluation Requirements", a distracter. * Answer "Introduction and General Model" is Part 1 of the Cc. It defines general concepts and principles of information security and defines the contents of the Protection Profile (PP), Security Target (ST), and the Package. * The Security Functional Requirements are Part 2 of the CC, which contains a catalog of welldefined standard means of expressing security requirements of IT products and systems. * Answer "Security Assurance Requirements" is Part 3 of the CC and comprises a catalog of a set of standard assurance components.

The term failover refers to: A. A fail-soft system. B. Terminating processing in a controlled fashion. C. Resiliency. D. Switching to a duplicate, hot backup component.

Answer: D The correct answer is "Switching to a duplicate, hot backup component". Failover means switching to a hot backup system that maintains duplicate states with the primary system. Answer "Terminating processing in a controlled fashion" refers to fail safe, and answers Resiliency and A fail-soft system refer to fail soft.

The Biba model axiom An object at one level of integrity is not permitted to modify (write to) an object of a higher level of integrity (no write up) is called: A. The Constrained Integrity Axiom B. The Discretionary Integrity Axiom C. The Simple Integrity Axiom D. The * (star) Integrity Axiom

Answer: D The correct answer is "The * (star) Integrity Axiom". Answers a and d are distracters. Answer the Simple Integrity Axiom states, Asubject at one level of integrity is not permitted to observe (read) an object of lower integrity (no read down).

Which of the following is NOT a proper media control? A. A proper storage environment should be provided for the media. B. The data media should be logged to provide a physical inventory control. C. All data storage media should be accurately marked. D. The media that is reused in a sensitive environment does not need sanitization.

Answer: D The correct answer is "The media that is reused in a sensitive environment does not need sanitization". Sanitization is the process of removing information from used data media to prevent data remanence. Different media require different types of sanitation. All the others are examples of proper media controls.

Content-dependent control makes access decisions based on: A. The object's environment. B. The object's view. C. The object's owner. D. The object's data.

Answer: D The correct answer is "The object's data". Answer "The object's environment" is contextdependent control. Answers The object's owner and The object's view are distracters.

Which one of the following is NOT a typical bus designation in a digital computer? A. Control B. Address C. Data D. Secondary

Answer: D The correct answer is Secondary, a distracter.

What is the block length of the Rijndael Cipher? A. 64 bits B. 128 bits C. 256 bits D. Variable

Answer: D The correct answer is Variable. The other answers with fixed numbers are incorrect.

Given an IP address of 172.16.0.0, which subnet mask below would allow us to divide the network into the maximum number of subnets with at least 600 host addresses per subnet? A. 255.255.240.0 B. 255.255.224.0 C. 255.255.248.0 D. 255.255.252.0

Answer: D The last two octets of this class B address, 252.0, gives us binary: 11111100.00000000. The six subnet bits give us 62 (26 -2) subnets, each with 1022 (210 -2) hosts, which allows us to have the maximum number of subnets with almost double the required host addresses. *, 224.0, is 11100000.00000000 binary, which gives us six (23 - 2) subnets with 8190 (213 -2) hosts each. * 240.0, is 11110000.00000000 binary, and gives us 14 (24 -2) subnets each with 4094 (212 -2) hosts. * 248.0, is 11111000.00000000 binary, which creates 30 (25 -2) subnets with 2046 (211 -2) hosts. Many books give detailed descriptions of IP subnetting.

When microcomputers were first developed, the instruction fetch time was much longer than the instruction execution time because of the relatively slow speed of memory accesses. This situation led to the design of the: A. Very-Long-Instruction-Word (VLIW) processor B. Superscalar processor C. Reduced Instruction Set Computer (RISC) D. Complex Instruction Set Computer (CISC)

Answer: D The logic was that since it took a long time to fetch an instruction from memory relative to the time required to execute that instruction in the CPU, then the number of instructions required to implement a program should be reduced. This reasoning naturally resulted in densely coded instructions with more decode and execution cycles in the processor. This situation was ameliorated by pipelining the instructions wherein the decode and execution cycles of one instruction would be overlapped in time with the fetch cycle of the next instruction. * Answer "Reduced Instruction Set Computer (RISC)", RISC, evolved when packaging and memory technology advanced to the point where there was not much difference in memory access times and processor execution times. Thus, the objective of the RISC architecture was to reduce the number of cycles required to execute an instruction. Accordingly, this increased the number of instructions in the average program by approximately 30%, but it reduced the number of cycles per instruction on the average by a factor of four. Essentially, the RISC architecture uses simpler instructions but makes use of other features such as optimizing compilers to reduce the number of instructions required and large numbers of general purpose registers in the processor and data caches. * The superscalar processor, answer "Superscalar processor", allows concurrent execution of instructions in the same pipelined stage. A scalar processor is defined as a processor that executes one instruction at a time. The term superscalar denotes multiple, concurrent operations performed on scalar values as opposed to vectors or arrays that are used as objects of computation in array processors. * For answer "Very-Long-Instruction-Word (VLIW) processor" multiple, concurrent operations are performed in a single instruction. Because multiple operations are performed in one instruction rather than using multiple instructions, the number of instructions is reduced relative to those in a scalar processor. However, for this approach to be feasible, the operations in each VLIW instruction must be independent of each other.

In steganography, A. Public key algorithms are used. B. Private key algorithms are used. C. Both public and private key algorithms are used. D. The fact that the message exists is not known.

Answer: D The other answers are incorrect because neither algorithm is used.

Serial data transmission in which information can be transmitted in two directions, but only one direction at a time, is called: A. Synchronized B. Full-duplex C. Simplex D. Half-duplex

Answer: D The time required to switch transmission directions in a half-duplex line is called the turnaround time. * Answer simplex refers to communication that takes place in one direction only. * Answer Synchronized is a distracter. * Full-duplex can transmit and receive information in both directions simultaneously. The transmissions can be asynchronous or synchronous. In asynchronous transmission, a start bit is used to indicate the beginning of transmission. The start bit is followed by data bits and, then, by one or two stop bits to indicate the end of the transmission. Since start and stop bits are sent with every unit of data, the actual data transmission rate is lower since these overhead bits are used for synchronization and do not carry information. In this mode, data is sent only when it is available and the data is not transmitted continuously. In synchronous transmission, the transmitter and receiver have synchronized clocks and the data is sent in a continuous stream. The clocks are synchronized by using transitions in the data and, therefore, start and stop bits are not required for each unit of data sent.

Which of the following is NOT an advantage of a stream cipher? A. The same equipment can be used for encryption and decryption. B. It is amenable to hardware implementations that result in higher speeds. C. Since encryption takes place bit by bit, there is no error propagation. D. The receiver and transmitter must be synchronized.

Answer: D The transmitter and receiver must be synchronized since they must use the same keystream bits for the same bits of the text that are to be enciphered and deciphered. Usually, synchronizing frames must be sent to effect the synchronization and, thus, additional overhead is required for the transmissions. * Answer "The same equipment can be used for encryption and decryption" describes an advantage since stream ciphers commonly use Linear Feedback Shift Registers (LFSRs) to generate the keystream and use XORs to operate on the plaintext input stream. Because of the characteristics of the XOR, the same XOR gates and LFSRs can also decrypt the message. Since LFSRs and XORs are used in a stream cipher to encrypt and decrypt, these components are amenable to hardware implementation, which means higher speeds of operation. Thus, answer "It is amenable to hardware implementations that result in higher speeds" describes an advantage. For answer "Since encryption takes place bit by bit, there is no error propagation", stream ciphers encrypt individual bits with no feedback of the generated ciphertext bits and, therefore, errors do not propagate.

The NIST Advanced Encryption Standard uses the: A. DES algorithm. B. IDEAalgorithm. C. Rijndael algorithm. D. 3 DES algorithm.

Answer: C The correct answer is Rijndael algorithm. By definition, the others are incorrect.

In the * (star) property of the Bell-LaPadula model, A. Subjects cannot read from their same level of security. B. Subjects cannot read from a higher level of security relative to their level of security. C. Subjects cannot read from a lower level of security relative to their level of security. D. Subjects cannot write to a lower level of security relative to their level of security.

Answer: D The correct answer by definition of the star property.

Using pre-numbered forms to initiate a transaction is an example of what type of control? A. Preventative control B. Deterrent control C. Detective control D. Application control

Answer: A The correct answer is "Preventative control". Pre-numbered forms are an example of preventative controls. They can also be considered a transaction control and input control.

Which of the following would be the BEST description of clipping levels? A. Variance detection of too many people with unrestricted access B. Changes a system's stored data characteristics C. A baseline of user errors above which violations will be recorded D. A listing of every error made by users to initiate violation processing

Answer: C The correct answer is "A baseline of user errors above which violations will be recorded". This description of a clipping level is the best. * It is not "A listing of every error made by users to initiate violation processing", because the reason for creating a clipping level is to prevent auditors from having to examine every error. * The answer "Variance detection of too many people with unrestricted access" is a common use for clipping levels but is not a definition. * Answer "Changes a system's stored data characteristics" is a distracter.

In a hybrid cryptographic system, usually: A. Digital certificates cannot be used. B. Neither public key nor private key cryptography is used. C. Public key cryptography is used for the encryption of the message. D. Private key cryptography is used for the encryption of the message.

Answer: D

The Take-Grant model: A. Specifies the rights that a subject can transfer to an object. B. Specifies the levels of availability. C. Specifies the levels of integrity. D. Focuses on confidentiality.

Answer: A

Which of the following choices describes the four phases of the National Information Assurance Certification and Accreditation Process (NIACAP)? A. Definition, Verification, Validation, and Post Accreditation B. Definition, Authentication, Verification, and Post Accreditation C. Definition, Verification, Validation, and Confirmation D. Verification, Validation, Authentication, and Post Accreditation

Answer: A

In a refinement of the BellÖLaPadula model, the strong tranquility property states that: A. Objects never change their security level. B. Objects can change their security level in an unconstrained fashion. C. Objects never change their security level in a way that would violate the system security policy. D. Subjects can read up.

Answer: A Answer "Objects never change their security level in a way that would violate the system security policy" is known as the weak tranquility property. The two other answers are distracters.

An associative memory operates in which one of the following ways? A. Searches for a specific data value in memory B. Uses indirect addressing only C. Returns values stored in a memory address location specified in the CPU address register D. Searches for values in memory exceeding a specified value

Answer: A Answer a refers to an addressing mode used in computers where the address location that is specified in the program instruction contains the address of the final desired location. * Answer "Searches for values in memory exceeding a specified value" is a distracter and answer "Returns values stored in a memory address location specified in the CPU address register" is the description of the direct or absolute addressing mode.

Which one of the following is generally NOT considered a covered entity under Title II, Administrative Simplification, of the HIPAA law? A. Employers B. Health care providers who transmit health information electronically in connection with standard transactions C. Health plans D. Health care clearinghouses

Answer: A Employers are not specifically covered under HIPAa. HIPAA applies to health care providers that transmit health care information in electronic form, health care clearinghouses, and health plans. However, some employers may be covered under the Gramm-Leach-Bliley Act. The Gramm-Leach-Bliley (GLB) Act was enacted on November 12, 1999, to remove Depression era restrictions on banks that limited certain business activities, mergers, and affiliations. It repeals the restrictions on banks affiliating with securities firms contained in sections 20 and 32 of the Glass-Steagall Act. GLB became effective on November 13, 2001. GLB also requires health plans and insurers to protect member and subscriber data in electronic and other formats. These health plans and insurers will fall under new state laws and regulations that are being passed to implement GLB, since GLB explicitly assigns enforcement of the health plan and insurer regulations to state insurance authorities (15 USc. ß6805). Some of the privacy and security requirements of Gramm-Leach-Bliley are similar to those of HIPAA. Most states required that health plans and insurers comply with the GLB requirements by July 1, 2001, and financial institutions were required to be in full compliance with Gramm-Leach-Bliley by this date. The other answers are incorrect since they are covered by the HIPAAregulations.

The Wireless Transport Layer Security (WTLS) Protocol in the Wireless Application Protocol (WAP) stack is based on which Internet Security Protocol? A. TLS B. SET C. S-HTTP D. IPSEC

Answer: A TLS is discussed in the answer to question 5. WTLS has to incorporate functionality that is provided for in TLS by TCP in the TCP/IP Protocol suite in that WTLS can operate over UDP. WTLS supports data privacy, authentication and integrity. Because WTLS has to incorporate a large number of handshakes when security is implemented, significant delays may occur. During a WTLS handshake session, WTLS can set up the following security classes: Class 1. No certificates Class 2. The client does not have a certificate; the server has a certificate Class 3. The client and server have certificates

The Number Field Sieve (NFS) is a: A. General purpose factoring algorithm that can be used to factor large numbers B. General purpose algorithm used for brute force attacks on secret key cryptosystems C. General purpose hash algorithm D. General purpose algorithm to calculate discreet logarithms

Answer: A The NFS has been successful in efficiently factoring numbers larger than 115 digits and a version of NFS has successfully factored a 155-digit number. Clearly, factoring is an attack that can be used against the RSA cryptosystem in which the public and private keys are calculated based on the product of two large prime numbers. The other answers are distracters.

The primary goal of the TLS Protocol is to provide: A. Privacy and data integrity between two communicating applications B. Authentication and data integrity between two communicating applications C. Privacy and authentication between two communicating applications D. Privacy, authentication and data integrity between two communicating applications

Answer: A The TLS Protocol is comprised of the TLS Record and Handshake Protocols. The TLS Record Protocol is layered on top of a transport protocol such as TCP and provides privacy and reliability to the communications. The privacy is implemented by encryption using symmetric key cryptography such as DES or RC4. The secret key is generated anew for each connection; however, the Record Protocol can be used without encryption. Integrity is provided through the use of a keyed Message Authentication Code (MAC) using hash algorithms such as SHA or MD5. The TLS Record Protocol is also used to encapsulate a higher-level protocol such as the TLS Handshake Protocol. This Handshake Protocol is used by the server and client to authenticate each other. The authentication can be accomplished using asymmetric key cryptography such as RSA or DSS. The Handshake Protocol also sets up the encryption algorithm and cryptographic keys to enable the application protocol to transmit and receive information.

Which of the following is NOT a property of a public key cryptosystem? (Let P represent the private key, Q represent the public key and M the plaintext message.) A. P and Q are difficult to generate from a particular key value. B. P[Q(M)] = M C. Q[P(M)] = M D. It is computationally infeasible to derive P from Q.

Answer: A The answer refers to the initial computation wherein the private and public keys are computed. The computation in this direction is relatively straightforward. Answers "Q[P(M)] = M" and "P[Q(M)] = M" state the true property of public key cryptography which is that a plaintext message encrypted with the private key can be decrypted by the public key and vice versa. Answer "It is computationally infeasible to derive P from Q" states that it is computationally infeasible to derive the private key from the public key. Obviously, this is a critical property of public key cryptography.

The following compilation represents what facet of cryptanalysis? A 8.2 B 1.5 C 2.8 D 4.3 E 12.7 F 2.2 G 2.0 H 6.1 I 7.0 J 0.2 K 0.8 L 4.0 M 2.4 N 6.7 O 7.5 P 1.9 Q 0.1 R 6.0 S 6.3 T 9.1 U 2.8 V 1.0 W 2.4 X 0.2 Y 2.0 Z 0.1 A. Frequency analysis B. Cilly analysis C. Cartouche analysis D. Period analysis

Answer: A The compilation is from a study by h. Becker and f. Piper that was originally published in Cipher Systems: The Protection of Communication. The listing shows the relative frequency in percent of the appearance of the letters of the English alphabet in large numbers of passages taken from newspapers and novels. Thus, in a substitution cipher, an analysis of the frequency of appearance of certain letters may give clues to the actual letter before transformation. Note that the letters E, A, and T have relatively high percentages of appearance in English text. *Answer "Period analysis" refers to a cryptanalysis that is looking for sequences that repeat themselves and for the spacing between repetitions. This approach is used to break the VigenËre cipher. * Answer "Cilly analysis" is a reference to a cilly, which was a three-character message key used in the German Enigma machine. * In answer "Cartouche analysis", a cartouche is a set of hieroglyphs surrounded by a loop. A cartouche referring to King Ptolemy was found on the Rosetta Stone.

Which of the following would NOT be an example of compensating controls being implemented? A. Modifying the timing of a system resource in some measurable way to covertly transmit information B. Sensitive information requiring two authorized signatures to release C. Asafety deposit box needing two keys to open D. Signing in or out of a traffic log and using a magnetic card to access to an operations center

Answer: A The correct answer is "Modifying the timing of a system resource in some measurable way to covertly transmit information". This is the definition for a covert timing channel. The other three are examples of compensating controls, which are a combination of technical, administrative, or physical controls to enhance security.

In most security protocols that support authentication, integrity and confidentiality, A. Public key cryptography is used to create digital signatures. B. Private key cryptography is used to create digital signatures. C. Digital signatures are not implemented. D. DES is used to create digital signatures.

Answer: A The correct answer is "Public key cryptography is used to create digital signatures.". Answer "Private key cryptography is used to create digital signatures" is incorrect because private key cryptography does not create digital signatures. Answer "DES is used to create digital signatures" is incorrect because DES is a private key system and, therefore, follows the same logic as in "Private key cryptography is used to create digital signatures"; and answer "Digital signatures are not implemented" is incorrect because digital signatures are implemented to obtain authentication and integrity.

The protocol of the Wireless Application Protocol (WAP), which performs functions similar to SSL in the TCP/IP protocol, is called the: A. Wireless Transport Layer Security Protocol (WTLS). B. Wireless Transaction Protocol (WTP). C. Wireless Session Protocol (WSP). D. Wireless Application Environment (WAE).

Answer: A The correct answer is "Wireless Transport Layer Security Protocol (WTLS)". SSL performs security functions in TCP/IP. The other answers refer to protocols in the WAP protocol stack also, but their primary functions are not security.

The Rijndael cipher employs a round transformation that is itself comprised of three layers of transformations. Which of the following is NOT one of these layers? A. Non-linear mixing layer B. Non-linear layer C. Key addition layer D. Linear mixing layer

Answer: A The correct answer is Non-linear mixing layer, a distracter.

The following elements comprise a portion of what services? Digital certification Certification authority Timestamping Lightweight Directory Access Protocol (LDAP) Non-repudiation support A. Public Key Infrastructure (PKI) B. Wireless Application Protocol (WAP) C. IPSec D. Transaction Layer Security (TLS)

Answer: A The correct answer is PKI, which describes the integration of digital certificates, digital signatures, and other services necessary to support e-commerce. The other answers are distracters.

Which of the following is an example of a symmetric key algorithm? A. Rijndael B. Knapsack C. RSA D. Diffie-Hellman

Answer: A The correct answer is Rijndael. The other answers are examples of asymmetric key systems.

Context-dependent control uses which of the following to make decisions? A. Subject or object attributes or environmental characteristics B. Data C. Formal models D. Operating system characteristics

Answer: A The correct answer is Subject or object attributes or environmental characteristics. Answer Data refers to content-dependent characteristics, and answers Formal models and "Operating system characteristics" are distracters.

A computer system that employs the necessary hardware and software assurance measures to enable it to process multiple levels of classified or sensitive information is called a: A. Trusted system. B. Open system. C. Closed system. D. Safe system.

Answer: A The correct answer is Trusted system, by definition of a trusted system. Answers Closed system and Open system refer to open, standard information on a product as opposed to a closed or proprietary product. Answer Safe system is a distracter.

Random access memory is: A. Volatile. B. Non-volatile. C. Sequentially addressable. D. Programmed by using fusible links.

Answer: A The correct answer is Volatile. RAM is volatile. The other answers are incorrect because RAM is volatile, randomly accessible, and not programmed by fusible links.

What is the result of the Exclusive Or operation, 1XOR 0? A. 1 B. Indeterminate C. 10 D. 0

Answer: A The correct answer is a. An XOR operation results in a 0 if the two input bits are identical and a 1 if one of the bits is a 1 and the other is a 0.

The Transport Layer Security (TLS) 1.0 protocol is based on which Protocol Specification? A. SSL-3.0 B. IPSEC C. TCP/IP D. SSH-2

Answer: A The differences between TLS and SSL are not great, but there is enough of a difference such that TLS 1.0 and SSL 3.0 are not operationally compatible. If interoperability is desired, there is a capability in TLS that allows it to function as SSL. Question 5 provides additional discussion of the TLS protocol.

If the application of a hash function results in an m-bit fixed length output, an attack on the hash function that attempts to achieve a collision after 2 m/2 possible trial input values is called a(n): A. Birthday attack B. Meet-in-the-middle attack C. Chosen-ciphertext attack D. Adaptive-chosen-plaintext attack

Answer: A This problem is analogous to asking the question How many people must be in a room for the probability of two people having the same birthday to be equal to 50%? The answer is 23. Thus, trying 2m/2 possible trial inputs to a hash function gives a 50% chance of finding two inputs that have the same hash value. Answer a, describes an attack in which the attacker can choose the plaintext to be encrypted and can modify his/her choice based on the results of a previous encryption. * Answer the chosen-cipher text attack is where the attacker can select different ciphertexts to be decrypted and has the decrypted plaintext available. This attack is used to determine the key or keys being used. Answer d is an attack against double encryption. This approach shows that for a key length of k bits, a chosen-plaintext attack could find the key after 2k+1 trials instead of 22k attempts. In this attack on double encryption, one encrypts from one end, decrypts from the other and compares the results in-the-middle.

The system component that enforces access controls on an object is the: A. Trusted domain. B. Reference monitor. C. Access control matrix. D. Security perimeter.

Answer: B

What is the key length of the Rijndael Block Cipher? A. 56 or 64 bits B. 128, 192, or 256 bits C. 512 or 1024 bits D. 512 bits

Answer: B

Primary storage is the: A. Memory used in conjunction with real memory to present a CPU with a larger, apparent address space. B. Memory directly addressable by the CPU, which is for the storage of instructions and data that are associated with the program being executed. C. Memory, such as magnetic disks, that provide non-volatile storage. D. Memory where information must be obtained by sequentially searching from the beginning of the memory space.

Answer: B * Answer "Memory, such as magnetic disks, that provide non-volatile storage" refers to secondary storage. * Answer "Memory used in conjunction with real memory to present a CPU with a larger, apparent address space" refers to virtual memory, and answer "Memory where information must be obtained by sequentially searching from the beginning of the memory space" refers to sequential memory.

What do the message digest algorithms MD2, MD4 and MD5 have in common? A. They are all used in the Secure Hash Algorithm (SHA). B. They all take a message of arbitrary length and produce a message digest of 128-bits. C. They all take a message of arbitrary length and produce a message digest of 160-bits. D. They are all optimized for 32-bit machines.

Answer: B * Answer "They all take a message of arbitrary length and produce a message digest of 160-bits" is obviously, then, incorrect. * Answer "They are all optimized for 32-bit machines" is incorrect since MD2 (B.S. Kaliski, The MD2 Message Digest Algorithm, RFC 1319, April 1992) is targeted for 8-bit machines. It is used in Privacy Enhanced Mail (PEM). MD4 (R.L. Rivest, The MD4 Message Digest Algorithm, RFC 1186, Oct 1990) and MD5 (R.L. Rivest, The MD5 Message Digest Algorithm, RFC 1321, April 1992) are designed for 32-bit machines. MD5 is considered more secure than MD4, and MD5 is also used in PEM. Answer d is incorrect since the SHAis a separate algorithm from MD2, MD4, and MD5, but is modeled after MD4. SHA produces a 160-bit message digest.

Which of the following BEST describes a block cipher? A. An asymmetric key algorithm that operates on a variable-length block of plaintext and transforms it into a fixed-length block of ciphertext B. A symmetric key algorithm that operates on a fixed-length block of plaintext and transforms it into a fixed-length block of ciphertext C. An asymmetric key algorithm that operates on a fixed-length block of plaintext and transforms it into a fixed-length block of ciphertext D. A symmetric key algorithm that operates on a variable-length block of plaintext and transforms it into a fixed-length block of ciphertext

Answer: B A block cipher breaks the plaintext into fixed-length blocks, commonly 64-bits, and encrypts the blocks into fixed-length blocks of ciphertext. Another characteristic of the block cipher is that, if the same key is used, a particular plaintext block will be transformed into the same ciphertext block. Examples of block ciphers are DES, Skipjack, IDEA, RC5 and AES. An example of a block cipher in a symmetric key cryptosystem is the Electronic Code Book (ECB) mode of operation. In the ECB mode, a plaintext block is transformed into a ciphertext block as shown in Figure. If the same key is used for each transformation, then a Code Book can be compiled for each plaintext block and corresponding ciphertext block. Answer a is incorrect since it refers to a variable-length block of plaintext being transformed into a fixed-length block of ciphertext. Recall that this operation has some similarity to a hash function, which takes a message of arbitrary length and converts it into a fixedlength message digest. * Answers "An asymmetric key algorithm that operates on a variable-length block of plaintext and transforms it into a fixed-length block of ciphertext" and "An asymmetric key algorithm that operates on a fixed-length block of plaintext and transforms it into a fixed-length block of ciphertext"are incorrect because they involve asymmetric key algorithms, and the block cipher is used with symmetric key algorithms. Exhibit: In other cryptographic modes of operation, such as Cipher Block Chaining (CBC), the result of the encryption of the plaintext block, Pn, is fed into the encryption process of plaintext block Pn+1. Thus, the result of the encryption of one block affects the result of the encryption of the next block in the sequence.

The model that addresses the situation wherein one group is not affected by another group using specific commands is called the: A. Information flow model B. Non-interference model C. Composition model D. Clark-Wilson model

Answer: B In the non-interference model, security policy assertions are defined in the abstract. The process of moving from the abstract to developing conditions that can be applied to the transition functions that operate on the objects is called unwinding. * Answer "Information flow model" refers to the information flow model in which information is categorized into classes, and rules define how information can flow between the classes. The model can be defined as [O, P, S, T] where O is the set of objects, P is the flow policy, S represents the valid states, and T represents the state transitions. The flow policy is usually implemented as a lattice structure. * The composition model, answer Composition model, investigates the resultant security properties when subsystems are combined.

Which of the following processes establish the minimum national standards for certifying and accrediting national security systems? A. DITSCAP B. NIACAP C. CIAP D. Defense audit

Answer: B The NIACAP provides a standard set of activities, general tasks, and a management structure to certify and accredit systems that will maintain the information assurance and security posture of a system or site. The NIACAP is designed to certify that the information system meets documented accreditation requirements and will continue to maintain the accredited security posture throughout the system life cycle. * Answer CIAP is being developed for the evaluation of critical commercial systems and uses the NIACAP methodology. * DITSCAP establishes for the defense entities a standard process, set of activities, general task descriptions, and a management structure to certify and accredit IT systems that will maintain the required security posture. The process is designed to certify that the IT system meets the accreditation requirements and that the system will maintain the accredited security posture throughout the system life cycle. The four phases to the DITSCAP are Definition, Verification, Validation, and Post Accreditation. * Answer "Defense audit" is a distracter.

Which attack type below does NOT exploit TCP vulnerabilities? A. Sequence Number attack B. Ping of Death C. SYN attack D. land.c attack

Answer: B The Ping of Death exploits the fragmentation vulnerability of large ICMP ECHO request packets by sending an illegal packet with more than 65K of data, creating a buffer overflow. * a TCP sequence number attack, which exploits the nonrandom predictable pattern of TCP connection sequence numbers to spoof a session. * a TCP SYN attack, is a DoS attack that exploits the TCP threeway handshake. The attacker rapidly generates randomly sourced SYN packets filling the target's connection queue before the connection can timeout. * land.c attack, is also a DoS attack that exploits TCP SYN packets. The attacker sends a packet that gives both the source and destination as the target's address, and uses the same source and destination port. Sources: Designing Network Security by Merike Kaeo (Cisco Press, 1999) and Mastering Network Security by Chris Brenton (Sybex, 1999).

Which of the following examples is the best definition of Fail Secure? A. The operating system is started without the security front-end loaded. B. The system preserves a secure state during and after a system crash. C. Access personnel have security clearance, but they do not have a need-to-know. D. The system fails to preserve a secure state during and after a system crash.

Answer: B The correct answer is "The system preserves a secure state during and after a system crash". Based on the Common Criteria, a system can be evaluated as fail secure if it preserves a secure state during and after identified failures occur.

The modes of DES do NOT include: A. Output Feedback. B. Variable Block Feedback. C. Electronic Code Book. D. Cipher Block Chaining.

Answer: B The correct answer is Variable Block Feedback. There is no such encipherment mode.

The graph in Figure, which depicts the equation y 2 = x3 + ax + b, denotes the: Exhibit: A. RSA Factoring problem B. Elliptic curve and the elliptic curve discrete logarithm problem C. ElGamal discrete logarithm problem D. Knapsack problem

Answer: B The elliptic curve is defined over a finite field comprised of real, complex or rational numbers. The points on an elliptic curve form a Group under addition. Multiplication (or multiple additions) in an elliptic curve system is equivalent to modular exponentiation; thus, defining a discreet logarithm problem.

What does the Bell-LaPadula model NOT allow? A. Subjects to write to a higher level of security relative to their level of security B. Subjects to read from a higher level of security relative to their level of security C. Subjects to read at their same level of security D. Subjects to read from a lower level of security relative to their level of security

Answer: B The other options are not prohibited by the model.

The principles of Notice, Choice, Access, Security, and Enforcement refer to which of the following? A. Nonrepudiaton B. Privacy C. Authorization D. Authentication

Answer: B These items are privacy principles. Notice refers to the collection, use, and disclosure of personally identifiable information (PII). Choice is the choice to opt out or opt in regarding the disclosure of PII to third parties; Access is access by consumers to their PII to permit review and correction of information. Security is the obligation to protect PII from unauthorized disclosure. Enforcement is the enforcement of applicable privacy policies and obligations. The other answers are distracters.

The organization that establishes a collaborative partnership of computer incident response, security and law enforcement professionals who work together to handle computer security incidents and to provide both proactive and reactive security services for the A. Federal CIO Council B. FederalComputer Incident Response Center C. CERT/CC D. Center for Infrastructure Protection

Answer: B To again quote the FedCIRC charter, FedCIRC provides assistance and guidance in incident response and provides a centralized approach to incident handling across agency boundaries. Specifically, the mission of FedCIRC is to: Provide civil agencies with technical information, tools, methods, assistance, and guidance Be proactive and provide liaison activities and analytical support Encourage the development of quality products and services through collaborative relationships with Federal civil agencies, the Department of Defense, academia, and private industry Promote the highest security profile for government information technology (IT) resources Promote incident response and handling procedural awareness with the federal government * Answer CERT Coordination Center (CERT/CC), is a unit of the Carnegie Mellon University Software Engineering Institute (SEI). SEI is a Federally funded R&D Center . CERT's mission is to alert the Internet community to vulnerabilities and attacks and to conduct research and training in the areas of computer security, including incident response. * Answer "Center for Infrastructure Protection" is a distracter and answer "Federal CIO Council", the Federal Chief Information Officers' Council, is the sponsor of FedCIRC.

In a ring protection system, where is the security kernel usually located? A. Highest ring number B. Middle ring number C. Lowest ring number D. Arbitrarily placed

Answer: C

Which standard below does NOT specify fiber optic cabling as its physical media? A. 1000BaseSX B. 100BaseFX C. 1000BaseCX D. 1000BaseLX

Answer: C 1000BaseCX refers to 1000Mbps baseband copper cable, using two pairs of 150 ohm balanced cable for CSMA/CD LANs. * 100BaseFX, specifies a 100 Mbps baseband fiber optic CSMA/CD LAN. Answer c, 1000BaseLX, specifies a 1000Mbps CSMA/CD LAN over long wavelength fiber optics. * 1000BaseSX, specifies a 1000Mbps CSMA/CD LAN over short wavelength fiber optics.

A cryptographic algorithm is also known as: A. A key B. Cryptanalysis C. A cipher D. A cryptosystem

Answer: C Acipher is a cryptographic transformation that operates on characters or bits. In different words, a cipher is defined as a cryptographic algorithm or mathematical function that operates on characters or bits and implements encryption or decryption. In contrast, a code operates with words, phrases and sentences. In a code, a word may be the encipherment of a sentence or phrase. For example, the word SCARF may be the code for the term BEWARE OF DUTCH TRAITOR IN YOUR MIDST. * a cryptosystem is a set of transformations from a message space to a ciphertext space. This system includes all cryptovariables (keys), plaintexts and ciphertexts associated with the transformation algorithm. The difference between answers a and c is that answer c, the correct answer, refers to the algorithm alone and answer a refers to the algorithm and all plaintexts, ciphertexts and cryptovariables associated with this algorithm. * cryptanalysis, refers to being able to break the cipher so that the encrypted message can be read. Cryptanalysis may be accomplished by exploiting weaknesses in the cipher or, in some fashion, determining the key. This act of obtaining the plaintext or key from the ciphertext can be used to recover sensitive or classified information and, perhaps, to pass on altered or fake messages in order to deceive the original intended recipient. * the key or cryptovariable, is used with a particular algorithm to encipher or decipher the plaintext message. By using the key, the algorithm can be publicly known and evaluated for its strength against attack. The key associated with a particular transformation or algorithm can take on many values and the range of all of these possible values is called the keyspace. Ideally, an enciphered plaintext message using a specific algorithm will produce a unique ciphertext message for each different key that is used with that algorithm. The situation in which a plaintext message generates identical ciphertext messages using the same transformation algorithm, but with different cryptovariables, is called key clustering. Obviously, this is not a desirable situation, since it effectively reduces the number of keys that have to be tried by an attacker in order to recover the plaintext.

In a block cipher, diffusion can be accomplished through: A. Nonlinear S-boxes B. Substitution C. Permutation D. XORing

Answer: C Diffusion is aimed at obscuring redundancy in the plaintext by spreading the effect of the transformation over the ciphertext. Permutation is also known as transposition and operates by rearranging the letters of the plaintext. *Answer substitution is used to implement confusion in a block cipher. Confusion tries to hide the relationship between the plaintext and the ciphertext. The Caesar cipher is an example of a substitution cipher. * XORing is incorrect since XORing, for example, as used in a stream cipher, implements confusion and not diffusion. Similarly, nonlinear S-boxes implement substitution. In DES, for example, there are eight different S-boxes that each has an input of 6 bits and an output of 4 bits. Thus, nonlinear substitution is effected.

Which of the following items BEST describes the standards addressed by Title II, Administrative Simplification, of the Health Insurance Portability and Accountability Act (US Kennedy-Kassebaum Health Insurance and Portability Accountability Act -HIPAA-Public Law 104-19)? A. Transaction Standards, to include Code Sets; Security and Electronic Signatures and Privacy B. Security and Electronic Signatures and Privacy C. Transaction Standards, to include Code Sets; Unique Health Identifiers; Security and Electronic Signatures and Privacy D. Unique Health Identifiers; Security and Electronic Signatures and Privacy

Answer: C HIPAA was designed to provide for greater access to personal health care information, enable portability of health care insurance, establish strong penalties for health care fraud, and streamline the health care claims process through administrative simplification. To accomplish the latter, Title II of the HIPAA law, Administrative Simplification, requires standardizing the formats for the electronic transmission of health care information. The transactions and code sets portion includes standards for submitting claims, enrollment information, premium payments, and others as adopted by HHS. The standard for transactions is the ANSI ASC X12N version 4010 EDI Standard. Standard code sets are required for diagnoses and inpatient services, professional services, dental services (replaces D' codes), and drugs (instead of J' codes). Also, local codes are not to be used. Unique health identifiers are required to identify health care providers, health plans, employers, and individuals. Security and electronic signatures are specified to protect health care information. Privacy protections are required to ensure that there is no unauthorized disclosure of individually identifiable health care information. The other answers are incorrect since they do not include all four major standards.

The Bell-LaPadula model addresses which one of the following items? A. Covert channels B. Definition of a secure state transition C. Information flow from high to low D. The creation and destruction of subjects and objects

Answer: C Information flow from high to low is addressed by the * -property of the BellÖLaPadula model, which states that a subject cannot write data from a higher level of classification to a lower level of classification. This property is also known as the confinement property or the no write down property. * In answer "Covert channels", covert channels are not addressed by the model. The Bell- LaPadula model deals with information flow through normal channels and does not address the covert passing of information through unintended paths. The creation and destruction of subjects and objects, answer "The creation and destruction of subjects and objects", is not addressed by the model. * Answer "Definition of a secure state transition" refers to the fact that the model discusses a secure transition from one secure state to another, but it never provides a definition of a secure transition.

A difference between the Information Technology Security Evaluation Criteria (ITSEC) and the Trusted Computer System Evaluation Criteria (TCSEC) is: A. TCSEC addresses availability as well as confidentiality B. ITSEC addresses confidentiality only C. ITSEC addresses integrity and availability as well as confidentiality D. TCSEC separates functionality and assurance

Answer: C TCSEC addresses confidentiality only and bundles functionality and assurance. Thus, the other answers are incorrect. By separating functionality and assurance as in ITSEC, one could specify fewer security functions that have a high level of assurance. This separation carried over into the Common Criteria.

Which protocol is used to resolve a known IP address to an unknown MAC address? A. ICMP B. RARP C. ARP D. TFTP

Answer: C The Address Resolution Protocol (ARP) sends a broadcast asking for the host with a specified IP address to reply with its MAC, or hardware address. This information is kept in the ARP Cache. * the Reverse Address Resolution Protocol (RARP) is commonly used on diskless machines, when the MAC is known, but not the IP address. It asks a RARP server to provide a valid IP address, which is somewhat the reverse of ARP. * the Internet Control Message Protocol (ICMP) is a management protocol for IP. * the Trivial File Transfer Protocol (TFTP), is a stripped-down version of the File Transfer Protocol (FTP).

The Clark-Wilson Integrity Model (d. Clark, d. Wilson, A Comparison of Commercial and Military Computer Security Policies, Proceedings of the 1987 IEEE Computer Society Symposium on Research in Security and Privacy, Los Alamitos, CA, IEEE Computer Society Press, 1987) focuses on what two concepts? A. Capability lists and domains B. Least privilege and well-formed transactions C. Separation of duty and well-formed transactions D. Well-formed transactions and denial of service

Answer: C The Clark-Wilson Model is a model focused on the needs of the commercial world and is based on the theory that integrity is more important than confidentiality for commercial organizations. Further, the model incorporates the commercial concepts of separation of duty and wellformed transactions. The well-formed transaction of the model is implemented by the transformation procedure (TP.)ATP is defined in the model as the mechanism for transforming the set of constrained data items (CDIs) from one valid state of integrity to another valid state of integrity. The Clark-Wilson Model defines rules for separation of duty that denote the relations between a user, TPs, and the CDIs that can be operated upon by those TPs. The model talks about the access triple that is the user, the program that is permitted to operate on the data, and the data. The other answers are distracters.

Which of the following is NOT a characteristic of the ElGamal public key cryptosystem? A. It is based on the discrete logarithm problem. B. It can be used to generate digital signatures. C. It can perform encryption, but not digital signatures. D. It can perform encryption.

Answer: C The ElGamal public key cryptosystem can perform both encryption and digital signatures based on the discrete logarithm problem. These three characteristics are shown in the examples that follow. To generate a key pair in the ElGamal system: A. Choose a prime number, p. B. Choose two random numbers, g and x (g and x must both be less than p). C. Calculate y = g x mod p. D. The private key is x and the public key is y, g, and p. To encrypt a message, M, in the ElGamal system: A. Select a random number, j, such that j is relatively prime to p-1. Recall that two numbers are relatively prime if they have no common factors other than 1. B. Generate w = g j mod p and z = y j M mod p. C. w and z comprise the ciphertext. To decrypt the message, M, in the ElGamal system, calculate M = z/w xmod p. This can be shown by substituting the values of z and w in the equation as follows: M = y j M mod p/ g jx mod p Since y j = g xj mod p M = (g xj M / g jx ) mod p To sign a message, M, in the ElGamal system: A. Select a random number, j, such that j is relatively prime to p-1. The value of j must not be disclosed. Generate w = g j mod p. B. Solve for z in the equation M = (xw + jz) mod (p-1). The solution to this equation is beyond the scope of this coverage. Suffice to say that an algorithm exists to solve for the variable z. C. w and z comprise the signature. D. Verification of the signature is accomplished if g M mod p = y w w z mod p.

Which one of the following statements BEST describes the operation of the Digital Signature Algorithm (DSA) (National Institute of Standards and Technology, NIST FIPS PUB 186, Digital Signature Standard, A. A message of < 264 bits is input to the DSA, and the resultant message digest of 160 bits is fed into the Secure Hash Algorithm (SHA), which generates the digital signature of the message. B. A message of < 264 bits is input to the Secure Hash Algorithm (SHA), and the resultant message digest of 160 bits is used as the digital signature of the message. C. A message of < 264 bits is input to the Secure Hash Algorithm (SHA), and the resultant message digest of 160 bits is fed into the DSA, which generates the digital signature of the message. D. A message of < 264 bits is input to the Secure Hash Algorithm (SHA), and the resultant message digest of 128 bits is fed into the DSA, which generates the digital signature of the message.

Answer: C The correct answer describes the proper sequence of operating on the message and has the correct value of 160 bits for the SHAmessage digest. At the receiving end, the message is fed into the SHA, and the result is compared to the received message digest to verify the signature. *Answer "A message of < 264 bits is input to the DSA, and the resultant message digest of 160 bits is fed into the Secure Hash Algorithm (SHA), which generates the digital signature of the message" is incorrect since the order of the DSA and SHA are in reverse sequence from the correct order of their application. * Answer "A message of < 264 bits is input to the Secure Hash Algorithm (SHA), and the resultant message digest of 128 bits is fed into the DSA, which generates the digital signature of the message." is incorrect since it has the incorrect value of 128 bits for the message digest produced by the SHa. * Answer "A message of < 264 bits is input to the Secure Hash Algorithm (SHA), and the resultant message digest of 160 bits is used as the digital signature of the message" is incorrect since the message digest has to be fed into the DSA to generate the digital signature of the message.

For fault-tolerance to operate, a system must be: A. Capable of a cold start. B. Capable of terminating operations in a safe mode. C. Capable of detecting and correcting the fault. D. Capable of only detecting the fault.

Answer: C The correct answer is "Capable of detecting and correcting the fault". The two conditions required for a faulttolerant system. Answer "Capable of only detecting the fault" is a distracter. Answer "Capable of terminating operations in a safe mode" is the definition of fail safe and answer "Capable of a cold start" refers to starting after a system shutdown.

Elliptic curves, which are applied to public key cryptography, employ modular exponentiation that characterizes the: A. Knapsack problem. B. Elliptic curve modular addition. C. Elliptic curve discrete logarithm problem. D. Prime factors of very large numbers.

Answer: C The correct answer is "Elliptic curve discrete logarithm problem". Modular exponentiation in elliptic curves is the analog of the modular discreet logarithm problem. * Answer "Prime factors of very large numbers" is incorrect because prime factors are involved with RSA public key systems; answer c is incorrect because modular addition in elliptic curves is the analog of modular multiplication; and answer "Knapsack problem" is incorrect because the knapsack problem is not an elliptic curve problem.

What are MD4 and MD5? A. Symmetric encryption algorithms B. Digital certificates C. Hashing algorithms D. Asymmetric encryption algorithms

Answer: C The correct answer is "Hashing algorithms". Answers "Symmetric encryption algorithms" and "Asymmetric encryption algorithms" are incorrect because they are general types of encryption systems, and answer "Digital certificates" is incorrect because hashing algorithms are not digital certificates.

In public key cryptography, A. The public key is used to encrypt and decrypt. B. Only the private key can encrypt and only the public key can decrypt. C. If the public key encrypts, then only the private key can decrypt. D. Only the public key can encrypt and only the private key can decrypt.

Answer: C The correct answer is "If the public key encrypts, then only the private key can decrypt". Answers "Only the private key can encrypt and only the public key can decrypt" and "Only the public key can encrypt and only the private key can decrypt" are incorrect because if one key encrypts, the other can decrypt. Answer "The public key is used to encrypt and decrypt"is incorrect because if the public key encrypts, it cannot decrypt.

What does IPL stand for? A. Internet Police League B. Initial Program Life Cycle C. Initial Program Load D. Initial Post-Transaction Logging

Answer: C The correct answer is "Initial Program Load". The IPL is a task performed by the operator to boot up the system. The other terms do not exist.

In the discretionary portion of the Bell-LaPadula mode that is based on the access matrix, how the access rights are defined and evaluated is called: A. Validation. B. Identification. C. Authorization. D. Authentication.

Answer: C The correct answer is Authorization, since authorization is concerned with how access rights are defined and how they are evaluated.

What information security model formalizes the US Department of Defense multi-level security policy? A. Stark-Wilson B. Clark-Wilson C. Bell-LaPadula D. Biba

Answer: C The correct answer is Bell-LaPadula. The Bell-LaPadula model addresses the confidentiality of classified material. Answers . Clark-Wilson and Biba are integrity models, and answer Stark-Wils is a distracter.

The classic Caesar cipher is a: A. Code group. B. Transposition cipher. C. Monoalphabetic cipher. D. Polyalphabetic cipher.

Answer: C The correct answer is Monoalphabetic cipher. It uses one alphabet shifted three places. Answers Polyalphabetic cipher and Transposition cipher are incorrect because in answer a, multiple alphabets are used and in answer Transposition cipher, the letters of the message are transposed. Answer Code group is incorrect because code groups deal with words and phrases and ciphers deal with bits or letters.

A secret mechanism that enables the implementation of the reverse function in a one-way function is called a: A. View. B. Open door. C. Trap door. D. Data diode.

Answer: C The correct answer is Trap door. Answer view refers to a mechanism in a database system that restricts access to certain information within the database. The view implements the principle of least privilege. Answer Open door is a distracter, and answer Data diode refers to a mechanism usually in multilevel security systems that limits the flow of classified information to one direction.

In order to recognize the practical aspects of multilevel security in which, for example, an unclassified paragraph in a Secret document has to be moved to an Unclassified document, the Bell-LaPadula model introduces the concept of a: A. Data flow B. Simple security property C. Trusted subject D. Secure exchange

Answer: C The model permits a trusted subject to violate the *-property but to comply with the intent of the *-property. Thus, a person who is a trusted subject could move unclassified data from a classified document to an unclassified document without violating the intent of the *-property. Another example would be for a trusted subject to downgrade the classification of material when it has been determined that the downgrade would not harm national or organizational security and would not violate the intent of the *-property. The simple security property (ss-property), answer "Simple security property", states that a subject cleared for one classification cannot read data from a higher classification. This property is also known as the no read up property. Answers Secure exchange and Data flow are distracters.

The ANSI X9.52 standard defines a variant of DES encryption with keys k1, k2, and k3 as: C = Ek3 [Dk2 [Ek1 [M]]] What is this DES variant? A. Double DES with an encryption and decryption with different keys B. Triple DES in the EEE mode C. Triple DES in theEDE mode D. DESX

Answer: C This version of triple DES performs an encryption (E) of plaintext message M with key k1, a decryption (D) with key k2 (essentially, another encryption), and a third encryption with key k3. Another implementation of DES EDE is accomplished with keys k1 and k2 being independent, but with keys k1 and k3 being identical. This implementation of triple DES is written as: C = Ek1 [Dk2 [Ek1 [M]]] Answer a is incorrect since, in DESX, input plaintext is bitwise XORed with 64 bits of additional key material before encryption with DES, and the output of DES is also bitwise XORed with another 64 bits of key material. Answer b, DES in the EEE, mode is written as: C = Ek3 [Ek2 [Ek1 [M]]] where three consecutive encryptions are performed on plaintext message, M, with three independent keys, k1, k2, k3. Answer c is incorrect since the question contains three encryptions. Implementing two DES encryptions does not provide the additional security anticipated over a single DES encryption because of the meet-in-the-middle attack. Consider a DES cipher with a key size of p. A double encryption will result in an effective key size of 2p and yield the final result R. Thus, one would anticipate that one would have to search a key space of 22p in an exhaustive search of the keys. However, it can be shown that a search of the key space on the order of 2p is all that is necessary. This search is the same size as required for a single DES encryption. This situation is illustrated as follows: The sequences shown illustrate the first DES encryption of a plaintext message M with all keys k1 through k2p yielding the intermediate encrypted results C1 through C2p. Ek1 [M] C1 Ek2 [M] C2 Ek2p [M] C2p If we have available ciphertext R where R = Ek2 [Ek1 [M]] for a pair of secret keys k1 and k2, for each key m there is only one key k such that Dm[R] = Ek[M] where D is the decipherment of R back from the second DES encipherment. In other words, there are 2p possible keys that will result in the pair [M,R] and, thus, can be found in a search of order 2p.

Superscalar computer architecture is characterized by a: A. Computer using instructions that are simpler and require less clock cycles to execute. B. Computer using instructions that perform many operations per instruction. C. Processor that executes one instruction at a time. D. Processor that enables concurrent execution of multiple instructions in the same pipeline stage.

Answer: D * Answer "Computer using instructions that perform many operations per instruction" is the definition of a complex instruction set computer. * Answer "Computer using instructions that are simpler and require less clock cycles to execute" is the definition of a reduced instruction set computer. * Answer "Processor that executes one instruction at a time" is the definition of a scalar processor.

A form of digital signature where the signer is not privy to the content of the message is called a: A. Encrypted signature B. Zero knowledge proof C. Masked signature D. Blind signature

Answer: D A blind signature algorithm for the message M uses a blinding factor, f; a modulus m; the private key, s, of the signer and the public key, q, of the signer. The sender, who generates f and knows q, presents the message to the signer in the form: Mf q (mod m) Thus, the message is not in a form readable by the signer since the signer does not know f. The signer signs Mf q (mod m) with his/her private key, returning (Mf q)s (mod m) This factor can be reduced to fMs (mod m) since s and q are inverses of each other. The sender then divides fMs (mod m) by the blinding factor, f, to obtain Ms (mod m) Ms (mod m) is, therefore, the message, M, signed with the private key, s, of the signer. Answer Zero knowledge proof refers to a zero knowledge proof. In general, a zero knowledge proof involves a person, A, trying to prove that he/she knows something, S, to another person, B, without revealing S or anything about S. Answers Masked signature and Encrypted signature are distracters.

What is one of the most common drawbacks to using a dual-homed host firewall? A. The examination of the packet at the Network layer introduces latency. B. The examination of the packet at the Application layer introduces latency. C. The ACLs must be manually maintained on the host. D. Internal routing may accidentally become enabled.

Answer: D A dual-homed host uses two NICs to attach to two separate networks, commonly a trusted network and an untrusted network. It's important that the internal routing function of the host be disabled to create an application-layer chokepoint and filter packets. Many systems come with routing enabled by default, such as IP forwarding, which makes the firewall useless. The other answers are distracters.

The British Standard 7799/ISO Standard 17799 discusses cryptographic policies. It states, An organization should develop a policy on its use of cryptographic controls for protection of its information . . . . When developing a policy, the following should be considered: (Which of the following items would most likely NOT be listed?) A. The approach to key management, including methods to deal with the recovery of encrypted information in the case of lost, compromised or damaged keys B. Roles and responsibilities C. The management approach toward the use of cryptographic controls across the organization D. The encryption schemes to be used

Answer: D A policy is a general statement of management's intent, and therefore, a policy would not specify the encryption scheme to be used. The other answers are appropriate for a cryptographic policy. The general standards document is BSI ISO/IEC 17799:2000,BS 7799- I: 2000, Information technology-Code of practice for information security management, British Standards Institution, London , UK . The standard is intended to provide a comprehensive set of controls comprising best practices in information security. ISO refers to the International Organization for Standardization and IEC is the International Electrotechnical Commission. These two entities form the system for worldwide standardization. The main chapter headings of the standard are: Security Policy Organizational Security Asset Classification and Control Personnel Security Physical and Environmental Security Communications and Operations Management Access Control Systems Development and Maintenance Business Continuity Management Compliance

Which statement below is correct regarding VLANs? A. A closed VLAN configuration is the least secure VLAN configuration. B. A VLAN is less secure when implemented in conjunction with private port switching. C. A VLAN is a network segmented physically, not logically. D. A VLAN restricts flooding to only those ports included in the VLAN.

Answer: D A virtual local area network (VLAN) allows ports on the same or different switches to be grouped so that traffic is confined to members of that group only, and restricts broadcast, unicast, and multicast traffic. Answer "A VLAN is a network segmented physically, not logically" is incorrect, because a VLAN is segmented logically, rather than physically. Answer "A VLAN is less secure when implemented in conjunction with private port switching" is incorrect. When a VLAN is implemented with private port, or single-user, switching, it provides fairly stringent security because broadcast vulnerabilities are minimized. Answer "A closed VLAN configuration is the least secure VLAN configuration" is incorrect, as a closed VLAN authenticates a user to an access control list on a central authentication server, where they are assigned authorization parameters to determine their level of network access. Sources: Catalyst 5000 Series Installation Guide (Cisco Systems) and Virtual LANs by Mariana Smith (McGraw-Hill, 1998).

The Platform for Privacy Preferences (P3P) was developed by the World Wide Web Consortium (W3C) for what purpose? A. To monitor users B. To implement public key cryptography for transactions C. To evaluate a client's privacy practices D. To implement privacy practices on Web sites

Answer: D As of this writing, the latest W3C working draft of P3P is P3P 1.0, 28 January, 2002 (www.w3.org/TR). An excerpt of the W3C P3P Specification states P3P enables Web sites to express their privacy practices in a standard format that can be retrieved automatically and interpreted easily by user agents. P3P user agents will allow users to be informed of site practices (in both machine- and human-readable formats) and to automate decision-making based on these practices when appropriate. Thus users need not read the privacy policies at every site they visit. With P3, an organization can post its privacy policy in machinereadable form (XML) on its Web site. This policy statement includes: Who has access to collected information The type of information collected How the information is used The legal entity making the privacy statement P3P also supports user agents that allow a user to configure a P3P-enabled Web browser with the user's privacy preferences. Then, when the user attempts to access a Web site, the user agent compares the user's stated preferences with the privacy policy in machine-readable form at the Web site. Access will be granted if the preferences match the policy. Otherwise, either access to the Web site will be blocked or a pop-up window will appear notifying the user that he/she must change their privacy preferences. Usually, this means that the user has to lower his/her privacy threshold. The other answers are distracters.

As an analog of confidentiality labels, integrity labels in the Biba model are assigned according to which of the following rules? A. Objects are assigned integrity labels according to their trustworthiness; subjects are assigned classes according to the harm that would be done if the data were modified improperly. B. Objects are assigned integrity labels identical to the corresponding confidentiality labels. C. Integrity labels are assigned according to the harm that would occur from unauthorized disclosure of the information. D. Subjects are assigned classes according to their trustworthiness; objects are assigned integrity labels according to the harm that would be done if the data were modified improperly.

Answer: D As subjects in the world of confidentiality are assigned clearances related to their trustworthiness, subjects in the Biba model are assigned to integrity classes that are indicative of their trustworthiness. Also, in the context of confidentiality, objects are assigned classifications related to the amount of harm that would be caused by unauthorized disclosure of the object. Similarly, in the integrity model, objects are assigned to classes related to the amount of harm that would be caused by the improper modification of the object. Answer a is incorrect since integrity properties and confidentiality properties are opposites. For example, in the Bell- LaPadula model, there is no prohibition against a subject at one classification reading information from a lower level of confidentiality. However, when maintenance of the integrity of data is the objective, reading of information from a lower level of integrity by a subject at a higher level of integrity risks contaminating data at the higher level of integrity. Thus, the simple and * -properties in the Biba model are complements of the corresponding properties in the Bell-LaPadula model. Recall that the Simple Integrity Property states that a subject at one level of integrity is not permitted to observe (read) an object of a lower integrity (no read down). Also, the *- Integrity Property states that an object at one level of integrity is not permitted to modify (write to) an object of a higher level of integrity (no write up). * Answer "Objects are assigned integrity labels according to their trustworthiness; subjects are assigned classes according to the harm that would be done if the data were modified improperly" is incorrect since the words object and subject are interchanged. * In answer "Integrity labels are assigned according to the harm that would occur from unauthorized disclosure of the information", unauthorized disclosure refers to confidentiality and not to integrity.

An interface to a library of software functions that provide security and cryptography services is called: A. A security application programming interface (SAPI) B. A confidentiality, integrity and availability application programming interface (CIAAPI) C. An assurance application programming interface (AAPI) D. A cryptographic application programming interface (CAPI)

Answer: D CAPI is designed for software developers to call functions from the library and, thus, make it easier to implement security services. An example of a CAPI is the Generic Security Service API (GSSAPI.) The GSS-API provides data confidentiality, authentication, and data integrity services and supports the use of both public and secret key mechanisms. The GSS-API is described in the Internet Proposed Standard RFC 2078. The other answers are made-up distracters.

Theoretically, quantum computing offers the possibility of factoring the products of large prime numbers and calculating discreet logarithms in polynomial time. These calculations can be accomplished in such a compressed time frame because: A. A quantum computer takes advantage of quantum tunneling in molecular scale transistors. This mode permits ultra high-speed switching to take place, thus, exponentially increasing the speed of computations. B. Information can be transformed into quantum light waves that travel through fiber optic channels. Computations can be performed on the associated data by passing the light waves through various types of optical filters and solid-state materials with varying indices of refraction, thus drastically increasing the throughput over conventional computations. C. A quantum computer exploits the time-space relationship that changes as particles approach the speed of light. At that interface, the resistance of conducting materials effectively is zero and exponential speed computations are possible. D. A quantum bit in a quantum computer is actually a linear superposition of both the one and zero states and, therefore, can theoretically represent both values in parallel. This phenomenon allows computation that usually takes exponential time to be accomplished in polynomial time since different values of the binary pattern of the solution can be calculated simultaneously.

Answer: D In digital computers, a bit is in either a one or zero state. In a quantum computer, through linear superposition, a quantum bit can be in both states, essentially simultaneously. Thus, computations consisting of trail evaluations of binary patterns can take place simultaneously in exponential time. The probability of obtaining a correct result is increased through a phenomenon called constructive interference of light while the probability of obtaining an incorrect result is decreased through destructive interference. Answer a describes optical computing that is effective in applying Fourier and other transformations to data to perform high-speed computations. Light representing large volumes of data passing through properly shaped physical objects can be subjected to mathematical transformations and recombined to provide the appropriate results. However, this mode of computation is not defined as quantum computing. Answers c and d are diversionary answers that do not describe quantum computing.

What type of firewall architecture employs two network cards and a single screening router? A. A dual-homed host firewall B. An application-level proxy server C. A screened-subnet firewall D. A screened-host firewall

Answer: D Like a dual-homed host, a screened-host firewall uses two network cards to connect to the trusted and untrusted networks, but adds a screening router between the host and the untrusted network. * dual-homed host has two NICs but not necessarily a screening router. * screened-subnet firewall uses two NICs also, but has two screening routers with the host Exhibit: acting as a proxy server on its own network segment. One screening router controls traffic local to the network while the second monitors and controls incoming and outgoing Internet traffic, * application-level proxy, is unrelated to this question.

The National Computer Security Center (NCSC) is: A. An activity within the US Department of Commerce that provides information security awareness training and develops standards for protecting sensitive but unclassified information B. A joint enterprise between the NSA and NIST for developing cryptographic algorithms and standards C. A division of the National Institute of Standards and Technology (NIST) that issues standards for cryptographic functions and publishes them as Federal Information Processing Standards (FIPS) D. A branch of the National Security Agency (NSA) that initiates research and develops and publishes standards and criteria for trusted information systems

Answer: D The NCSC promotes information systems security awareness and technology transfer through many channels, including the annual National Information Systems Security Conference. It was founded in 1981 as the Department of Defense Computer Security Center , and its name was change in 1985 to NCSc. It developed the Trusted Computer Evaluation Program Rainbow series for evaluating commercial products against information system security criteria. All the other answers are, therefore incorrect since they refer to NIST, which is under the US Department of Commerce.

The strength of RSApublic key encryption is based on the: A. Difficulty of multiplying two large prime numbers. B. Difficulty in finding logarithms in a finite field. C. Fact that only one key is used. D. Difficulty in finding the prime factors of very large numbers.

Answer: D The correct answer is "Difficulty in finding the prime factors of very large numbers". Answer "Difficulty in finding the prime factors of very large numbers" applies to public key algorithms such as Diffie-Hellman and Elliptic Curve. Answer "Difficulty of multiplying two large prime numbers" is incorrect because it is easy to multiply two large prime numbers. Answer "Fact that only one key is used" refers to symmetric key encryption.

Configuration management control best refers to: A. The use of privileged-entity controls for system administrator functions. B. Implementing resource protection schemes for hardware control. C. The concept of least control in operations. D. Ensuring that changes to the system do not unintentionally diminish security.

Answer: D The correct answer is "Ensuring that changes to the system do not unintentionally diminish security". Configuration Management Control (and Change Control) are processes to ensure that any changes to the system are managed properly and do not inordinately affect either the availability or security of the system.

In Part 3 of the Common Criteria, Security Assurance Requirements, seven predefined Packages of assurance components that make up the CC scale for rating confidence in the security of IT products and systems are called: A. Protection Assurance Levels (PALs). B. Security Target Assurance Levels (STALs). C. Assurance Levels (ALs). D. Evaluation Assurance Levels (EALs).

Answer: D The correct answer is "Evaluation Assurance Levels (EALs)". The other answers are distracters.

Which is NOT true about Covert Channel Analysis? A. It is required for B2 class systems in order to protect against covert storage channels. B. It is an operational assurance requirement that is specified in the Orange Book. C. It is required for B3 class systems to protect against both covert storage and covert timing channels. D. It is required for B2 class systems to protect against covert timing channels.

Answer: D The correct answer is "It is required for B2 class systems to protect against covert timing channels". Orange Book B2 class systems do not need to be protected from covert timing channels. Covert channel analysis must be performed for B2-level class systems to protect against covert storage channels only. B3 class systems need to be protected against both covert storage channels and covert timing channels.

Which of the following is NOT a symmetric key algorithm? A. Data Encryption Standard (DES) B. Advanced Encryption Standard (AES) C. International Data Encryption Algorithm (IDEA) D. MD5

Answer: D The correct answer is MD5. MD5 is a message digest algorithm.

Apolyalphabetic cipher is also known as: A. One-time pad. B. Steganography. C. Vernam cipher. D. VigenËre cipher.

Answer: D The correct answer is VigenËre cipher. * Answer "One-time pad" is incorrect because a one-time pad uses a random key with length equal to the plaintext message and is used only once. * Answer "Steganography" is the process of sending a message with no indication that a message even exists. *Answer "Vernam cipher" is incorrect because it applies to stream ciphers that are XORed with a random key string.

An iterated block cipher encrypts by breaking the plaintext block into two halves and, with a subkey, applying a round transformation to one of the halves. Then, the output of this transformation is XORed with the remaining half. The round is completed by swapping the two halves. This type of cipher is known as: A. RC6 B. Diffie-Hellman C. RC4 D. Feistel

Answer: D The question stem describes one round of a Feistel cipher. This algorithm was developed by an IBM team led by Horst Feistel. (h. Feistel, Cryptography and Computer Privacy, Scientific American, v.228, n.5, May 1973) The algorithm was called Lucifer and was the basis for the Data Encryption Standard (DES). In answer a, RC4 is a variable keysize stream cipher developed by Ronald Rivest. In this type of cipher, a sequence of bits that are the key is bit-wise XORed with the plaintext. * Diffie-Hellman describes the first public key algorithm and is based on the difficulty of calculating discrete logarithms in a finite field. (W. Diffie and M.e. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, v. IT-22, n. 6, Nov 1976). It is used for exchanging keys. RC6, in answer c, is a fast block cipher designed by Rivest, Sidney and Yin. In RC6, the block size, the key size and the number of rounds are variable. The key size can be no larger than 2040 bits. RC6 was one of the five finalists in the Advanced Encryption Standard (AES) competition.

The Wireless Transport Layer Security Protocol (WTLS) in the Wireless Application Protocol (WAP) stack provides for security: A. Between the Internet and the content server B. Between the WAP content server and the WAP client C. Between the WAP gateway and the content server D. Between the WAP client and the gateway

Answer: D Transport Layer Security (TLS) provides for security between the content server on the Internet and the WAP gateway. (Answer "Between the WAP gateway and the content server" is, thus, incorrect.) Similarly, WTLS provides security between the WAP mobile device (client software) and the WAP gateway. Since WAP cannot interface directly with the Internet, all WAP information has to be converted to HTTP in the WAP gateway to enable it to exchange information with the Internet content servers. The simple block diagram illustrates these concepts. Exhibit: A vulnerability occurs since data encrypted with wireless protocols has to be decrypted in the WAP gateway and then re-encrypted with the Internet protocols. This process is reversed when data flows from the Internet content servers to the WAP client. Thus, the information is vulnerable while it is in the decrypted state on the WAP gateway. This condition is known as the WAP Gap. In order to address this issue, the WAP Forum has put forth specifications that will reduce this vulnerability and, thus, support e-commerce applications. These specifications are defined in WAP 1.2 as WMLScript Crypto Library and the WAP Identity Module (WIM). The WMLScript Crypto Library supports end-to-end security by providing for cryptographic functions to be initiated on the WAP client from the Internet content server. These functions include digital signatures originating with the WAP client and encryption and decryption of data. The WIM is a tamper-resistant device, such as a smart card, that cooperates with WTLS and provides cryptographic operations during the handshake phase. The WAP Forum is also considering another alternative to providing the end-to-end encryption for WAP. This alternative, described in WAP specification 1.3, is the use of a client proxy server that communicates authentication and authorization information to the wireless network server. *Answer "Between the Internet and the content server" is incorrect since the content server is on the Internet side of the communication and answer "Between the WAP content server and the WAP client" assumes a direct interface between the content server and the client without going through the necessary Internet and wireless protocols.

Using a modulo 26 substitution cipher where the letters A to Z of the alphabet are given a value of 0 to 25, respectively, encrypt the message OVERLORD BEGINS. Use the key K =NEW and D =3 where D is the number of repeating letters representing the key. The encrypted message is: A. BFAEPKEH XRKFAW B. BFAEPKEH XRKEAW C. BFAERKEH XRKEAW D. BFAEQKEH XRKFAW E. BZAEPKEH XRKFAW F. BZAEPKEH XRKEAW G. BZAERKEH XRKEAW H. BZAEQKEH XRKFAW

Answer: F The solution is as follows: OVERLORD becomes 14 21 4 17 11 14 17 3 BEGINS becomes 1 4 6 8 13 18 The key NEW becomes 13 4 22 Adding the key repetitively to OVERLORD BEGINS modulo 26 yields 1 5 0 4 15 10 4 7 23 17 10 4 0 22, which translates to BZAEPKEH XRKEAW More in detail:

Which choice below is NOT an element of a fiber optic cable? A. BNC B. Jacket C. Core D. Cladding

Answer: A A BNC refers to a Bayonet Neil Concelman RG58 connector for 10Base2. Fiber optic cable has three basic physical elements, the core, the cladding, and the jacket. The core is the innermost transmission medium, which can be glass or plastic. The next outer layer, the cladding is also made of glass or plastic, but has different properties, and helps to reflect the light back into the core. The outermost layer, the jacket, provides protection from heat, moisture, and other environmental elements.

A portion of a VigenËre cipher square is given below using five (1, 2, 14, 16, 22) of the possible 26 alphabets. Using the key word bow, which of the following is the encryption of the word advance using the VigenËre cipher? Exhibit: A. b r r b b y f B. b r r b b y h C. b r r b c y f D. b r r b j y f

Answer: A The VigenËre cipher is a polyalphabetic substitution cipher. The key word bow indicates which alphabets to use. The letter b indicates the alphabet of row 1, the letter o indicates the alphabet of row 14, and the letter w indicates the alphabet of row 22. To encrypt, arrange the key word, repetitively over the plaintext as shown in Table. Exhibit: Thus, the letter a of the plaintext is transformed into b of alphabet in row 1, the letter d is transformed into r of row 14, the letter v is transformed into r of row 22 and so on.

The memory hierarchy in a typical digital computer, in order, is: A. CPU, cache, primary memory, secondary memory. B. CPU, cache, secondary memory, primary memory. C. CPU, secondary memory, cache, primary memory. D. CPU, primary memory, secondary memory, cache.

Answer: A The correct answer is "CPU, cache, primary memory, secondary memory". In this architecture, the CPU sees the high-speed cache, which holds the instructions and data from primary memory that have a high probability of being executed by the program. In order of speed of access, the order in the correct answer goes from the fastest to the slowest access time.

The property that states, Reading or writing is permitted at a particular level of sensitivity, but not to either higher or lower levels of sensitivity is called the: A. Strong * (star) Property. B. Simple * (star) Property. C. * (star) Security Property. D. Discretionary Security Property.

Answer: A The correct answer is "Strong * (star) Property". * Answer "the Discretionary Security Property" specifies discretionary access control in the Bell- LaPadula model by the use of an access matrix. * Answer "Simple * (star) Property" is distracter. * Answer "* (star) Security Property", in the Bell-LaPadula model, states, The writing of information by a subject at a higher level of sensitivity to an object at a lower level of sensitively is not permitted (no write down).

The Biba model addresses: A. Unauthorized modification of data. B. Transformation procedures. C. Constrained data items. D. Data disclosure.

Answer: A The correct answer is "Unauthorized modification of data". The Biba model is an integrity model. Answer "Data disclosure" is associated with confidentiality. Answers "Transformation procedures" and "Constrained data items" are specific to the Clark- Wilson model.

DESX is a variant of DES in which: A. The output of DES is bitwise XORed with 64 bits of key material. B. Input plaintext is bitwise XORed with 64 bits of additional key material before encryption with DES, and the output of DES is also bitwise XORed with another 64 bits of key material. C. The input plaintext is encrypted X times with the DES algorithm using different keys for each encryption. D. Input plaintext is bitwise XORed with 64 bits of additional key material before encryption with DES.

Answer: B DESX was developed by Ron Rivest to increase the resistance of DES to brute force key search attacks; however, the resistance of DESX to differential and linear attacks is equivalent to that of DES with independent subkeys.

The addressing mode in which an instruction accesses a memory location whose contents are the address of the desired data is called: A. Implied addressing. B. Direct addressing. C. Indirect addressing. D. Indexed addressing.

Answer: C

What are the hardware, firmware, and software elements of a Trusted Computing Base (TCB) that implement the reference monitor concept called? A. An Operating System (OS) B. Atrusted computing system C. Asecurity kernel D. The trusted path

Answer: C

The secure path between a user and the Trusted Computing Base (TCB) is called: A. Trusted facility management B. Trusted distribution C. Trusted path D. The security perimeter

Answer: C Answer trusted distribution ensures that valid and secure versions of software have been received correctly. Trusted facility management, answer "Trusted facility management", is concerned with the proper operation of trusted facilities as well as system administration and configuration. Answer "The security perimeter", the security perimeter, is the boundary that separates the TCB from the remainder of the system. Recall that the TCB is the totality of protection mechanisms within a computer system that are trusted to enforce a security policy.

The Common Criteria terminology for the degree of examination of the product to be tested is: A. Functionality (F) B. Target of Evaluation (TOE) C. Evaluation Assurance Level (EAL) D. Protection Profile (PP)

Answer: C The Evaluation Assurance Levels range from EA1 (functional testing) to EA7 (detailed testing and formal design verification). The Target of Evaluation (TOE), answer a, refers to the product to be tested. Answer b, Protection Profile (PP), is an implementationindependent specification of the security requirements and protections of a product that could be built. A Security Target (ST) is a listing of the security claims for a particular IT security product. Also, the Common Criteria describes an intermediate grouping of security requirement components as a package. Functionality, answer c, refers to Part 2 of the Common Criteria that contains standard and well-understood functional security requirements for IT systems.

The hashing algorithm in the Digital Signature Standard (DSS) generates a message digest of: A. 130 bit B. 56 bits C. 120 bits D. 160 bits

Answer: D

The ANSI ASC X12 (American National Standards Institute Accredited Standards Committee X12) Standard version 4010 applies to which one of the following HIPAA categories? A. Security B. Privacy C. Transactions D. Code sets

Answer: C The transactions addressed by HIPAA are: Health claims or similar encounter information Health care payment and remittance advice Coordination of Benefits Health claim status Enrollment and disenrollment in a health plan Eligibility for a health plan Health plan premium payments Referral certification and authorization The HIPAA EDI transaction standards to address these HIPAA transactions include the following: Health care claims or coordination of benefits Retail drug NCPCP (National Council for Prescription Drug Programs) v. 32 Dental claim ASC X12N 837: dental Professional claim ASC X12N 837: professional Institutional claim ASC X12N 837: institutional Payment and remittance advice ASC X12N 835 Health claim status ASC X12N 276/277 Plan enrollment ASC X12 834 Plan eligibility ASC X12 270/271 Plan premium payments ASC X12 820 Referral certification ASC X12 N 278 The American National Standards Institute was founded in 1917 and is the only source of American Standards. The ANSI Accredited Standards Committee X12 was chartered in 1979 and is responsible for cross-industry standards for electronic documents. The HIPAAprivacy standards, answer a, were finalized in April, 2001, and implementation must be accomplished by April 14, 2003. The privacy rule covers individually identifiable health care information transmitted, stored in electronic or paper form, or communicated orally. Protected health information (PHI) may not be disclosed unless disclosure is approved by the individual, permitted by the legislation, required for treatment, part of health care operations, required by law, or necessary for payment. PHI is defined as individually identifiable health information that is transmitted by electronic media, maintained in any medium described in the definition of electronic media under HIPAA, or is transmitted or maintained in any other form or medium. Answer b, code sets, refers to the codes that are used to fill in the data elements of the HIPAAtransaction standards. Examples of these codes are: ICD-9-CM (vols. 1 and 2) International Classification of Diseases, 9th Ed., Clinical Modification Diseases, injuries, impairments, other health related problems, their manifestations, and causes of injury, disease, impairment, or other health-related problems CPT (Current Procedural Terminology, 4th Ed. [CPT-4]), CDT (Code on Dental Procedures and Nomenclature, 2nd Ed. [CDT-2]) or ICD-9-CM (vol. 3) Procedures or other actions taken to prevent, diagnose, treat, or manage diseases, injuries, and impairments NDC (National Drug Codes) drugs HCPCS (Health Care Financing Administration Common Procedure Coding System) Other health-related services, other substances, equipment, supplies, or other items used in health care services The proposed HIPAA Security Rule, answer d, mandates the protection of the confidentiality, integrity, and availability of protected health information (PHI) through: Administrative procedures Physical safeguards Technical services and mechanisms The rule also addresses electronic signatures, but the final rule will depend on industry progress on reaching a standard. In addition, the proposed security rule requires the appointment of a security officer.

In the National Information Assurance Certification and Accreditation Process (NIACAP), a type accreditation performs which one of the following functions? A. Evaluates the applications and systems at a specific, self-contained location B. Evaluates a major application or general support system C. Verifies the evolving or modified system's compliance with the information agreed on in the System Security Authorization Agreement (SSAA) D. Evaluates an application or system that is distributed to a number of different locations

Answer: D * Answer "Evaluates a major application or general support system" is the NIACAP system accreditation. * Answer "Verifies the evolving or modified system's compliance with the information agreed on in the System Security Authorization Agreement (SSAA)" is the Phase 2 or Verification phase of the Defense Information Technology Security Certification and Accreditation Process (DITSCAP). The objective is to use the SSAA to establish an evolving yet binding agreement on the level of security required before the system development begins or changes to a system are made. After accreditation, the SSAA becomes the baseline security configuration document. * Answer "Evaluates the applications and systems at a specific, self-contained location" is the NIACAP site accreditation.

Ablock cipher: A. Converts a variable-length of plaintext into a fixed length ciphertext. B. Is an asymmetric key algorithm. C. Encrypts by operating on a continuous data stream. D. Breaks a message into fixed length units for encryption.

Answer: D The correct answer is "Breaks a message into fixed length units for encryption". Answer "Encrypts by operating on a continuous data stream" describes a stream cipher. Answer "Is an asymmetric key algorithm" is incorrect because a block cipher applies to symmetric key algorithms; and answer "Converts a variable-length of plaintext into a fixed length ciphertext" describes a hashing operation.

When two different keys encrypt a plaintext message into the same ciphertext, this situation is known as: A. Cryptanalysis. B. Public key cryptography. C. Hashing. D. Key clustering.

Answer: D The correct answer is "Key clustering" Answer "Public key cryptography" describes a type of cryptographic system using a public and a private key; answer Cryptanalysis is the art/science of breaking ciphers; answer Hashing is the conversion of a message of variable length into a fixed-length message digest.

The Clark-Wilson model focuses on data's: A. Availability. B. Confidentiality. C. Format. D. Integrity.

Answer: D The correct answer is Integrity. The Clark-Wilson model is an integrity model.


Ensembles d'études connexes

American History Midterms Review

View Set

Lesson 8: Kennedy and the Cold War

View Set

COTAC II EXAM 2 QUIZZES, ONCOLOGY/REPRODUCTIVE

View Set

Chapter 6: Volcanoes & Other Igneous Activity

View Set

Central Ideas and Context: Utopia 222

View Set

Ch.12: Regulation of Firms w/ Market Power

View Set