ISACA CSX Practice Quiz - BH

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

To which of the following layers of the open systems interconnect model would one map Ethernet? A. Datalink B. Network C. Application D. Transport

A. Datalink

The attack mechanism directed against the system is commonly called a(n): A. Exploit B. Vulnerability C. Payload D. Attack vector

C. Payload

A firewall that tracks open connection- oriented protocol sessions is set to be: A. State- sponsored B. Stateless C. Stateful D. Stated

C. Stateful

Who has the greatest influence over access security in a password authentication environment? A. System administrators B. Business executives C. Users D. Security managers

C. Users

Outsourcing poses the greatest risk to an organization when it involves: A. Business support services B. Technology infrastructure C. Cyber security capabilities D. Core business functions

D. Core business functions

A cyber security architecture designed around the concept of a perimeter is said to be: A. Data-centric B. User-centric C. Integrated D. System-centric

D. System-centric

What kind of anti-malware program evaluate system processes based on their observed behaviors? A. Heuristic B. Signature based C. Stateful D. Polymorphic

A. Heuristic

Updates in cloud- computing environments can be rolled out quickly because the environment is: A. Homogeneous B. Distributed C. Diversified D. Secure

A. Homogeneous

Securing supervisory control and data acquisition (SCADA) systems can be challenging because they: A. Operate in specialized environments an often have non- standard design elements B. Are subject to specialized requirements established for national security systems C. Support critical infrastructure processes for which any risk of compromise is unacceptable D. Cannot be replaced due to aging infrastructure and the complexity of included components

A. Operate in specialized environments an often have non- standard design elements

During which phase of the system development lifecycle (SDLC) should security first be considered? A. Planning B. Analysis C. Design D. Implementation

A. Planning

Which two factors are used to calculate the likelihood of an event? A. Threat and vulnerability B. Vulnerability and asset value C. Asset count and asset value D. Threat and asset count

A. Threat and vulnerability

Which of the following offers the strongest protection for wireless network traffic? A. Wireless Protected Access 2 (WPA2) B. Wireless Protected Access - Advanced Encryption Standard (WPA-AES) C. Wired Equivalent Protection 128-bit (WEP-128) D. Wireless Protected Access - Temporary Key Integrity Protocol (WPA-TKIP)

A. Wireless Protected Access 2 (WPA2)

In practical applications: A. Symmetric key encryption is used to securely distribute asymmetric keys B. Asymmetric key encryption is used to securely obtain symmetric keys C. Symmetric key encryption is used only for short messages, such as digital signatures D. Asymmetric key encryption is used in cases where speed is important

B. Asymmetric key encryption is used to securely obtain symmetric keys

A segmented network: A. Offers defense in depth superior to a concentric-layers model B. Consists of two or more security zones C. Maximizes the delay experienced by an attacker D. Delivers superior performance for internal applications

B. Consists of two or more security zones

A business continuity plan (BCP) is not complete unless it includes: A. Dedicated resources B. Detailed procedures C. Network diagrams D. Critical processes

B. Detailed procedures

A risk assessment should be performed: A. At the start of a program B. On a regular basis C. When an asset changes D. When a vulnerability is discovered

B. On a regular basis

A passive network hub operates at which layer of the OSI model? A. Data link B. Physical C. Network D. Transport

B. Physical

Which of the following interpret requirements and apply them to specific situations? A. Policies B. Standards C. Guidelines D. Procedures

B. Standards

Maintaining a high degree of confidence regarding the integrity of evidence requires a(n): A. Power of attorney B. Sworn statement C. Chain of custody D. Affidavit

C. Chain of custody

An interoperability error is what type of vulnerability? A. Technical B. Process C. Emergent D. Organizational

C. Emergent

What is one advantage of a firewall implemented in software over a firewall appliance? A. Performance B. Power consumption C. Flexibility D. Resiliency

C. Flexibility

Virtual systems should be managed using dedicated virtual local area network (VLAN) because: A. Network topology's do not always properly identify the locations of virtual servers B. VLAN encryption provides a double layer of protection for virtual system data C. Insecure protocols could result in a compromise of privileged user credentials D. Segregation of management traffic use and traffic dramatically improves performance

C. Insecure protocols could result in a compromise of privileged user credentials

Which cybersecurity principle is most important when attempting to trace the source of malicious activity? A. Availability B. Integrity C. Nonrepudiation D. Confidentiality

C. Nonrepudiation

Where should an organization's network terminate virtual private network (VPN) tunnels? A. At an interior router, to reduce network traffic congestion B. At a dedicated "honey pot" system in a Demilitarized Zone (DMZ) C. At the destination system, to prevent loss of confidentiality D. At the perimeter, to allow for effective internal monitoring

D. At the perimeter, to allow for effective internal monitoring

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of: A. Available resources B. Levels of effort C. Projected costs D. Business needs

D. Business needs

During which phase of the six- phase incident response model is the root cause determined? A. Recovery B. Identification C. Containment D. Eradication

D. Eradication

Under the US-CERT model for incident categorization, a CAT-3 incident refers to which one of the following? A. Improper usage B. Investigation C. Denial of service (DoS) D. Malicious code

D. Malicious code


संबंधित स्टडी सेट्स

PH 102 ch 19. conceptual questions

View Set