1. Which of the following would be an indicator of the effectiveness of a computer security incident response team?

2. A program that does not reproduce itself but pretends to be performing a legitimate action, which acting performing malicious operations in the background is the characteristic of which of the following?

3. Which of the following protocol is usually used in a site-to-site VPN?

4. The role of the certificate authority (CA) as a third party is to:

5. It is estimated that for the moment the computers in your company will be infected by viruses about 3 times annually. Each time it will cost $4000. Which of the following solution would you consider for better security?

6. When using a universal storage bus (USB) flash drive to transport confidential corporate data to an offsite location, an effective control would be to:

7. The goals of integrity do NOT include:

8. What are the characteristics of the encryption used in PKI? (Choose two)

9. Which of the following is a problem with symmetric key encryption?

10. Which of the followings can be accomplished by applying a Digital Signature to an email?

11. Which of the following would MOST effectively enhance the security of a challenge-response based authentication system?

12. In order to ensure constant redundancy and fault-tolerance, which of the following type of spare is recommended?

13. Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication are:

14. While downloading software, a hash may be provided to:

15. The primary function of a physical protection system is?