ISMN 5730 TEST 2
what is the initial requirement to be performed in establishing a BCP?
agree on the scope of the plan
what are the goals of physical security?
deter, delay, detect
digital signatures do not allow for:
confidentiality of the message
a camera located outside a server room door supports which of the following physical security objectives?
detect
digital signatures allow for:
detection of modification of the message, authentication of the sender, 3rd party verification of the sender
a stream mode cipher would be most applicable for which of the following tasks?
encrypting a real-time broadcast of a digital video conference between heads of state
which of the following best describes a hot site:
fully equipped back up center with external interfaces (power, water, etc.) and telecommunications, as well as complete computing. resources on site
which of the following best explains BIA?
it is the process of analyzing all business functions to determine the effect of IT outages in the business
examples of types of physical access controls:
locks, guard stations, gates
which of the following is NOT a key strategy for developing a physical security program?
management support for physical measurements of security
in order of least allowable downtime to most allowable downtime, rank these recovery strategies:
mirror site, hot site, warm site, cold site
the most important goal of any BCP is:
preserve human life
what is the best known example of a symmetric key cipher?
DES
using asymmetric (public key) encryption to provide the recipient of a message with "proof of origin" requires that the sender...
encrypt the message with the sender's private key
which of the following examples would best fit the "Deter" goal of physical security?
a sign on a fence that reads "WARNING: Electrified Fence" that is installed around the HVAC system on the side of a building
which of the following is a key strategy for developing a physical security program?
surveillance for high visual control, controlled flow of movement through limited access, territoriality culture among employees
which of the following is TRUE regarding symmetric cryptography?
the same key is used by both the sender (encryptor) and receiver (decryptor)