CM243_v2

考前須知

CISA及CISSP:成為訊息安全審查員或訊息安全專員課程自我檢查

1. What are the characteristics of the encryption used in PKI? (Choose two)

2. It is estimated that for the moment the computers in your company will be infected by viruses about 3 times annually. Each time it will cost $4000. Which of the following solution would you consider for better security?

3. A program that does not reproduce itself but pretends to be performing a legitimate action, which acting performing malicious operations in the background is the characteristic of which of the following?

4. The primary function of a physical protection system is?

5. In order to ensure constant redundancy and fault-tolerance, which of the following type of spare is recommended?

6. Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication are:

7. Which of the followings can be accomplished by applying a Digital Signature to an email?

8. Which of the following would be an indicator of the effectiveness of a computer security incident response team?

9. The role of the certificate authority (CA) as a third party is to:

10. The goals of integrity do NOT include:

11. Which of the following is a problem with symmetric key encryption?

12. Which of the following protocol is usually used in a site-to-site VPN?

13. When using a universal storage bus (USB) flash drive to transport confidential corporate data to an offsite location, an effective control would be to:

14. While downloading software, a hash may be provided to:

15. Which of the following would MOST effectively enhance the security of a challenge-response based authentication system?