You are on page 1of 17

____ functions are mathematical algorithms that generate a message summary

or digest to confirm the identity of a specific message and to confirm that there
have not been any changes to the content.
Selected Answer:
Hash
Answers:
Hash
Map
Key
Encryption
Question 2

A method of encryption that requires the same secret key to encipher and
decipher the message is known as ____ encryption.
Selected Answer:
symmetric
Answers:

asymmetric

symmetric
public
private

A false positive is the failure of an IDPS system to react to an actual attack event.

Answers:

True
False

Most of the technologies that scan human characteristics convert these images
to some form of minutiae.
Selected Answer:

True

Answers:

True
False

____ is a specially configured connection on a network device that is capable of


viewing all of the traffic that moves through the entire device.
Selected Answer:
SPAN
Answers:

NIDPS

SPAN
DPS
IDSE

Class C fires are those fueled by combustible metals, such as magnesium,


lithium, and sodium.
Selected Answer:
Answers:

False
True
False

Physical security is just as important as logical security to an information security


program.
Selected Answer:

True

Answers:

True
False

Enticement is the action of luring an individual into committing a crime to get a


conviction.
Selected Answer:
Answers:

False
True
False

The ____ is the level at which the number of false rejections equals the false
acceptances, and is also known as the equal error rate.
Selected Answer:
CER

Answers:

BIOM
REC
IIS

CER

A common form of mechanical strike locks are electric strike locks, which
(usually) require people to announce themselves before being buzzed through
a locked door.
Selected Answer:
Answers:

False
True
False

Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to


protect against electronic payment fraud.
Selected Answer:

True

Answers:

True
False

A wireless security toolkit should include the ability to sniff wireless traffic, scan
wireless hosts, and assess the level of privacy or confidentiality afforded on the
wireless network.
Selected Answer:

True

Answers:

True
False

A name badge is typically worn concealed.


Selected Answer:
Answers:

False
True
False

A(n) response attack is an attempt to resubmit a recording of the deciphered


authentication to gain entry into a secure source.
Selected Answer:
Answers:

False
True
False

Once the OS is known, all of the vulnerabilities to which a system is susceptible


can easily be determined.
Selected Answer:

True

Answers:

True
False

The most sophisticated locks are ____ locks.

Selected Answer:
biometric
Answers:

manual
programmable
electronic

biometric

Most guards have clear ____ that help them to act decisively in unfamiliar
situations.
Selected Answer:
SOPs
Answers:

MACs

SOPs
POSs
OPSs

Keycard readers based on smart cards are often used to secure computer rooms,
communications closets, and other restricted areas.
Selected Answer:

True

Answers:

True

False

Cold detectors measure rates of change in the ambient temperature in the room.
Selected Answer:
Answers:

False
True
False

Hash algorithms are public functions that create a hash value by converting
variable-length messages into a single fixed-length value.
Selected Answer:

True

Answers:

True
False

Symmetric encryption uses two different but related keys, and either key can be
used to encrypt or decrypt the message.
Selected Answer:
Answers:

False
True
False

In the ____ approach, the sensor detects an unusually rapid increase in the area
temperature within a relatively short period of time.

Selected Answer:
rate-of-rise
Answers:

fixed temperature
permanent temperature
fixed rate

rate-of-rise

Vibration sensors fall into the motion sensor category.


Selected Answer:
Answers:

False
True
False

A HIDPS can monitor systems logs for predefined events.


Selected Answer:

True

Answers:

True
False

Common implementations of RA include systems that issue digital certificates to


users and servers; directory enrollment; key issuing systems; tools for managing
the key issuance; and verification and return of certificates.

Selected Answer:

False

Answers:

True
False

A(n) man-in-the-middle attack attempts to intercept a public key or even to insert


a known key structure in place of the requested public key.
Selected Answer:

True

Answers:

True
False

____ involves a wide variety of computing sites that are distant from the base
organizational facility and includes all forms of telecommuting.
Selected Answer:
Remote site computing
Answers:
Remote site computing
Telecommuting
Remote working
Hot site computing

A device that assures the delivery of electric power without interruption is a(n)
____.

Selected Answer:
UPS
Answers:

GFCI
HVAC
GPS

UPS

____ is the action of luring an individual into committing a crime to get a


conviction.
Selected Answer:
Entrapment
Answers:
Entrapment
Enticement
Intrusion
Padding

SPS systems provide power conditioning.


Selected Answer:
Answers:

False
True

False

A ____ system is designed to work in areas where electrical equipment is used.


Instead of containing water, the system contains pressurized air.
Selected Answer:
dry-pipe
Answers:

wet-pipe

dry-pipe
deluge
sprinkler

The AES algorithm was the first public key encryption algorithm.
Selected Answer:
Answers:

False
True
False

Carbon dioxide systems rob fire of its oxygen.


Selected Answer:

True

Answers:

True
False

____ is the entire range of values that can possibly be used to construct an
individual key.
Selected Answer:
Keyspace
Answers:

Code

Keyspace
Algorithm
Cryptogram

Fingerprinting is the organized research of the Internet addresses owned or


controlled by a target organization.

Answers:

True
False

The trace usually consists of a honeypot or padded cell and an alarm.


Selected Answer:
Answers:

False
True
False

A HIDPS is optimized to detect multihost scanning, and it is able to detect the


scanning of non-host network devices, such as routers or switches.
Selected Answer:
Answers:

False
True
False

Class ____ fires are extinguished by agents that remove oxygen from the fire.
Selected Answer:
B
Answers:

B
C
D

Fire ____ systems are devices installed and maintained to detect and respond to a
fire, potential fire, or combustion danger situation.
Selected Answer:
suppression
Answers:

detection

suppression
protection
prevention

A starting scanner is one that initiates traffic on the network in order to


determine security holes.
Selected Answer:
Answers:

False
True
False

Which of the following ports is commonly used for the HTTP protocol?
Selected Answer:
80
Answers:

20
25
53

80

The number of horizontal and vertical pixels captured and recorded is known as
the images depth.

Answers:

True
False

Using ____, the system reviews the log files generated by servers, network
devices, and even other IDPSs.
Selected Answer:
LFM
Answers:
LFM
stat IDPS
AppIDPS
HIDPS

A wet-pipe system is usually considered appropriate in computer rooms.

Answers:

True
False

Once the attacker has successfully broken an encryption, he or she may launch a
replay attack, which is an attempt to resubmit a recording of the deciphered
authentication to gain entry into a secure source.

Answers:

True
False

IDPS researchers have used padded cell and honeypot systems since the late
____.
Selected Answer:
1980s
Answers:

1960s
1970s

1980s
1990s

Bit stream methods commonly use algorithm functions like the exclusive OR
operation (____).
Selected Answer:
XOR
Answers:
XOR
EOR
NOR

OR

NIDPSs can reliably ascertain if an attack was successful or not.


Selected Answer:
Answers:

False
True
False

The SHTTP security solution provides six services: authentication by digital


signatures, message encryption, compression, e-mail compatibility,
segmentation, and key management.
Selected Answer:
Answers:

False
True
False

In order to determine which IDPS best meets an organizations needs, first


consider the organizational environment in technical, physical, and political
terms.
Selected Answer:

True

Answers:

True
False

You might also like