Tough Questions 11-20

  1. Mobile devices place an emphasis on battery consumption and frequently have limited processing power. What type of encryption is best suited to devices such as this?
     
    (a) RSA
    (b) Diffie-Hellman
    (c) EAP-TLS
    (d) PEAP
    (e) ECC
    (f) AES
    (g) Vernam ciphers
     
    Answer:
    (e) ECC
     
    Explanation:
    (a) RSA asymmetric encryption requires long keys and therefore has a high processing overhead
    (b) Diffie-Hellman is used for key exchange, not encryption in its own right
    (c) & (d) are not concerned with encryption per se
    (e) Elliptic curve cryptography is as secure as RSA using much smaller keys (at least 12 times smaller), so the processing power required is minimal
    (f) AES does not particularly lend itself to limited processing power scenarios
    (g) Vernam ciphers are another name for onetime pads, but again not what we’re looking for in this question
     
  2. Designed by Bruce Schneier, Blowfish is an encryption algorithm originally designed as an alternative to DES. Which of the following are characteristics of Blowfish? (Choose four)
     
    (a) Key sizes of 128, 192 & 256 bits
    (b) Key sizes from 32-448 bits
    (c) Symmetric
    (d) Asymmetric
    (e) Patented
    (f) Un-patented & license-free
    (g) Used in bcrypt
    (h) Used in scrypt
     
    Answers:
    (b), (c), (f), (g)
     
    Explanation:
    (a) These are the key sizes associated with AES
    (b) Yes – think of a fish blowing up from 32 to 448 bits!
     
  3. The storage room in your office is equipped with an electronic lock that is configured to fail secure. What does this mean?
     
    (a) Electricity keeps the lock engaged. If the power goes out, the lock will disengage, allowing the door to open.
    (b) There is no current flowing to the door. In an emergency, an electric current will lock the door.
    (c) Electricity keeps the lock disengaged. If the power goes out, the lock will engage, locking the door
    (d) The lock can be controlled from a central location and locked/unlocked remotely
    (e) The emergency systems in the building will unlock the door in the event of an emergency
    (f) The emergency systems in the building will lock the door in the event of an emergency
     
    Answer:
    (c)
     
    Explanation:
    Fail safe means “fail safe for people”, fail secure means “fail secure for your stuff”! In a fail safe lock, electricity locks the door, so a loss of power will unlock the door. In a fail secure lock, electricity keeps the door unlocked, and a loss of power will lock the door. Note that even a fail secure lock generally allows free egress, e.g. a way for someone inside the secure building/area to get out.
     
  4. Your fire alarm system is being upgraded and you are considering the best options. One of the requirements is automatic notification of the local fire department when there is an event. Which type of system will provide this functionality?
     
    (a) Protected premises fire alarm system
    (b) Central station fire alarm system
    (c) Auxiliary fire alarm system
    (d) Public fire alarm reporting system
    (e) Municipal fire alarm system
    (f) Combination fire alarm system
     
    Answer:
    (c)
     
    Explanation:
    (a) is a local system
    (b) involves a third-party monitoring company, e.g. ADT, not the fire department directly
    (c) is a local system plus an interface to local emergency services
    (d) & (e) are similar to each other, i.e. alarm system for the municipality, not something that can be installed in a private building
    (f) is still local, the combination aspect relates to interfacing CCTV, CO detectors etc into the fire system
     
  5. Which of the following statements best align with (ISC)2‘s code of ethics? (Choose four)
     
    (a) Work to protect society, public trust & the infrastructure
    (b) Avoid using the Internet as a test network; consider the potential outcomes of your actions
    (c) Be honest, act responsibility & with the confines of the law
    (d) Deliver your product on time, as defined & within the allowed budget
    (e) Be decisive, confident & articulate when dealing with principals
    (f) Safeguard your systems using a complement of administrative, technical & physical controls
    (g) Be competent in what you do, and be diligent in the maintenance of that competence
    (h) Seek, through your actions, to improve the profession of information security
     
    Answers:
    (a), (c), (g), (h)
     
  6. ISO/IEC 15408 is an international standard for computer security certification. It provides a set of requirements for security functionality of IT products during a security evaluation, with the goal of providing a level of assurance that the product/system performs in a certain way. What is the more common name for this standard?
     
    (a) NIST
    (b) RMF
    (c) TCSEC
    (d) ITSEC
    (e) Common Criteria
    (f) Certification & Accreditation
    (g) PCI
    (h) COBIT
     
    Answer:
    (e) Common Criteria
     
  7. TCP, the Transmission Control Protocol, is referred to as being a ‘connection-oriented’ protocol. This, in part, means that client & server must first establish a connection before transmitting any data. The connection setup process is referred to as the “3-Way Handshake”. Which of the following is the appropriate order & direction of packets sent during the handshake?
     
    (a) SYN from server to client, SYN/ACK from client to server, ACK from server to client
    (b) SYN from client to server, SYN/ACK from server to client, ACK from server to client
    (c) SYN from client to server, SYN/ACK from server to client, ACK from client to server
    (d) SYN from client to server, ACK from server to client, ACK/PSH from client to server
    (e) SYN/PSH from client to server, ACK/PSH from server to client, ACK from client to server
     
    Answer:
    (c)
     
    Explanation:
    Client initiates connection by sending a SYN, server replies with a SYN/ACK, client sends an ACK.
     
  8. 802.11 wireless LANs (WLANs) are inherently half-duplex. Because of this, they must arbitrate the use of the medium in order to manage collisions with other nodes on the radio network. Which of the following mechanisms is used by 802.11 in order to accomplish this?
     
    (a) WDM (Wave Division Multiplexing)
    (b) CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
    (c) TDMA (Time Division Multiple Access)
    (d) CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
    (e) Different frequencies for transmission & receive functions
    (f) Token passing
    (g) Time slots
    (h) PCM (Pulse Code Modulation)
     
    Answer:
    (d)
     
    Explanation:
    (a) is used for fibre transmissions, (b) for early Ethernet, (c) for mobile phones, (h) is used for digital audio/telephony
     
  9. DDL, the Data Definition Language, is a standard for commands used to create the different structures in a database. The commands are used to create, modify or delete objects in a database. It is also used to create the logical structure of the database, including the definitions of all the objects & attributes in the database and their relationships to each other. What is the term used to describe this logical database structure?
     
    (a) DCL
    (b) Schema
    (c) Normalisation
    (d) Polyinstantiation
    (e) Cardinality
    (f) Relational
    (g) SQL (Structured Query Language)
    (h) DML
    (i) AJAX
     
    Answer:
    (b)
     
    Explanation
    (a) DCL (Data Control Language) is associated with commits & rollbacks etc.
     
  10. In addition to IP addresses, DHCP servers provide network nodes with additional useful information such as a DNS server address, default gateway, and NetBIOS node type. Which of the following is NOT a legitimate attack that may be executed against your DHCP deployment? (Choose three)
     
    (a) A rogue DHCP server on your network can offer IP addresses to legitimate users, thereby creating a DoS or MitM Situation
    (b) An attacker may gain control of your DHCP server and reconfigure the options assigned to your clients
    (c) Using TCP redirect messages, an attacker can send client DHCP packets to a remote DHCP server
    (d) A rogue DHCP server can be used to reconfigure SMTP connection settings for internal email systems
    (e) An attacker can request multiple IP addresses from the legitimate DHCP server, exhausting the available pool of addresses
    (f) An attacker can remotely send negative acknowledgements whenever a client attempts to renew an IP address
     
    Answer:
    (c), (d), (f)
     
    Explanation:
    (c) for various reasons, not least that DHCP is UDP based

Leave a comment

Design a site like this with WordPress.com
Get started