Hamster
Search
Open menu
CM243_v2
考前須知
CISA及CISSP:成為訊息安全審查員或訊息安全專員課程自我檢查
1. What are the characteristics of the encryption used in PKI? (Choose two)
A.
Reversible
B.
Symmetric
C.
Non-reversible
D.
Asymmetric
2. It is estimated that for the moment the computers in your company will be infected by viruses about 3 times annually. Each time it will cost $4000. Which of the following solution would you consider for better security?
A.
Set up a thin client environment at the cost of $13000 annually.
B.
Migrate to Linux at the cost of $13000 annually.
C.
Install anti-virus software at the cost of $10000 annually.
D.
Install a firewall at the cost of $20000 annually.
3. A program that does not reproduce itself but pretends to be performing a legitimate action, which acting performing malicious operations in the background is the characteristic of which of the following?
A.
Worms.
B.
Virus.
C.
Trojan.
D.
Trapdoor.
4. The primary function of a physical protection system is?
A.
Determine, direct and dispatch.
B.
Evaluate, dispatch and detain.
C.
Display, develop, initiate and apprehend.
D.
Detection, delay and response.
5. In order to ensure constant redundancy and fault-tolerance, which of the following type of spare is recommended?
A.
Archives.
B.
Cold spare.
C.
Hot spare.
D.
Warm spare.
6. Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication are:
A.
Biometric devices.
B.
Technological systems.
C.
Physical analysis devices.
D.
Physiometric devices.
7. Which of the followings can be accomplished by applying a Digital Signature to an email?
A.
The contents of the email cannot be read by others except the receiver.
B.
The receiver will notice if the contents of the email is altered during the transmission.
C.
The identity of the sender can be assured.
D.
The identity of the receiver can be assured.
8. Which of the following would be an indicator of the effectiveness of a computer security incident response team?
A.
Percentage of business applications that are being protected.
B.
Financial impact per security incident.
C.
Number of successful penetration tests.
D.
Number of security vulnerabilities that were patched.
9. The role of the certificate authority (CA) as a third party is to:
A.
Act as a trusted intermediary between two communication partners.
B.
Provide secured communication and networking services based on certificates.
C.
Confirm the identity of the entity owning a certificate issued by that CA.
D.
Host a repository of certificates with the corresponding public and secret keys issued by that CA.
10. The goals of integrity do NOT include:
A.
Prevention of the modification of information by unauthorized users.
B.
Accountability of responsible individuals.
C.
Prevention of unauthorized or unintentional modification of information by users.
D.
Preservation of internal and external consistency.
11. Which of the following is a problem with symmetric key encryption?
A.
Is slower than asymmetric key encryption
B.
Secure distribution of the secret key
C.
Work factor is not a function of the key size
D.
Most algorithms are kept proprietary
12. Which of the following protocol is usually used in a site-to-site VPN?
A.
RSA
B.
IPSec
C.
PPP
D.
DES
13. When using a universal storage bus (USB) flash drive to transport confidential corporate data to an offsite location, an effective control would be to:
A.
Encrypt the folder containing the data with a strong key.
B.
Request that management deliver the flash drive by courier.
C.
Assure management that you will not lose the flash drive.
D.
Carry the flash drive in a portable safe.
14. While downloading software, a hash may be provided to:
A.
Ensure that the software is the correct revision number.
B.
Ensure that the software has not been modified.
C.
Ensure that the software comes from a genuine source.
D.
Serve as a license key for paid users of the software.
15. Which of the following would MOST effectively enhance the security of a challenge-response based authentication system?
A.
Implementing measures to prevent session hijacking attacks.
B.
Selecting a more robust algorithm to generate challenge strings.
C.
Increasing the length of authentication strings.
D.
Increasing the frequency of associated password changes.