CM243_v2

考前須知

CISA及CISSP:成為訊息安全審查員或訊息安全專員課程自我檢查

1. It is estimated that for the moment the computers in your company will be infected by viruses about 3 times annually. Each time it will cost $4000. Which of the following solution would you consider for better security?

2. Which of the followings can be accomplished by applying a Digital Signature to an email?

3. What are the characteristics of the encryption used in PKI? (Choose two)

4. In order to ensure constant redundancy and fault-tolerance, which of the following type of spare is recommended?

5. Which of the following would be an indicator of the effectiveness of a computer security incident response team?

6. Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication are:

7. Which of the following protocol is usually used in a site-to-site VPN?

8. When using a universal storage bus (USB) flash drive to transport confidential corporate data to an offsite location, an effective control would be to:

9. Which of the following would MOST effectively enhance the security of a challenge-response based authentication system?

10. A program that does not reproduce itself but pretends to be performing a legitimate action, which acting performing malicious operations in the background is the characteristic of which of the following?

11. The goals of integrity do NOT include:

12. While downloading software, a hash may be provided to:

13. The role of the certificate authority (CA) as a third party is to:

14. Which of the following is a problem with symmetric key encryption?

15. The primary function of a physical protection system is?