For 802.11 wireless LANs, which of the following is a feature shared by both WPA2-PSK and WPA2-Enterprise? (a) Both utilise server-side authentication using server-side certs(b) Both support 128-bit AES-CCMP(c) Both support WPS (Wi-Fi Protected Setup)(d) Both use RC4 to provide integrity for data frames(e) Both can only be used in the 2.4 GHz frequency ranges Answer:(b) Explanation:(a) isContinue reading “Tough Questions 141-150”
Author Archives: Chris
Tough Questions 121-130
Which federal government agency has responsibility for ensuring the security of government computer systems that are not used to process sensitive and/or classified information? (a) National Security Agency(b) Federal Bureau of Investigation(c) National Institute of Standards and Technology(d) Secret Service Answer:(c) Explanation:NIST is charged with the security management of all federal computer systems not used to process sensitiveContinue reading “Tough Questions 121-130”
Tough Questions 71-120
Which of the following key lengths are available in the Rijndael encryption algorithm (Select all that apply) (a) 64 bits(b) 72 bits(c) 128 bits(d) 112 bits(e) 168 bits(f) 192 bits(g) 256 bits(h) 512 bits Answers:(c), (f), (g) Explanation:Technically, Rijndael supports key lengths of 128 bits up to 256 bits, in 32-bit increments, but the AES standard (which usesContinue reading “Tough Questions 71-120”
Things To Remember
Domain 1: Security & Risk Mgmt Governments tend to prioritise confidentiality, private companies often favour availability. DAD is the inverse of CIA:– Disclosure is the inverse of Confidentiality– Alteration is the inverse of Integrity– Destruction is the inverse of Availability Operational Technology systems (PLCs, SCADA) tend to prefer availability, then integrity, then finally confidentiality –Continue reading “Things To Remember”
Tough Questions 61-70
You are using an encryption scheme which generates seemingly random bits which are then XOR’d with the plaintext data in order to product ciphertext. Which type of algorithm is this? (a) Stream cipher(b) ECC(c) Diffie-Hellman(d) RSA(e) Key stretching(f) Block cipher Answer:(a) Your company is being a cloud migration and is planning on moving many of its existingContinue reading “Tough Questions 61-70”
Tough Questions 51-60
You have just learned that several of your developer’s notebooks are infected with information-stealing malware. The infection vector appears to be malicious banner ads on a third-party website populate with the developers in your business. Which of the following attacks has most likely occurred? (a) Spear phishing(b) Social engineering(c) Watering hole(d) Buffer overflow(e) Rootkit Answer:(c) Explanation:A watering holeContinue reading “Tough Questions 51-60”
Tough Questions 41-50
Here are 10 different line items, seven (7) of which are part of the NIST recommended contingency planning (CP) process.Select the seven that are part of the process, and organise them in order, from first to last: (a) Create contingency strategies(b) Develop an information system CP(c) Identify misuse case scenarios(d) Conduct a Business Impact Analysis (BIA)(e)Continue reading “Tough Questions 41-50”
Tough Questions 31-40
Crime Prevention Through Environmental Design (CPTED) seeks to deter criminal/inappropriate activity through techniques of environmental design. Which of the following are components of CPTED’s strategy? (Choose three) (a) Natural access control(b) End-user security awareness training(c) Building code security reviews(d) Community activism(e) Natural territorial reinforcement(f) Environmental inconveniences(g) Natural surveillance Answers:(a), (e), (g) Explanation:(a) Natural access control endeavours to clearlyContinue reading “Tough Questions 31-40”
Tough Questions 21-30
Cryptography provides many different types of protections of information. When utilised correctly, which of the following represent thing that cryptography CAN do? (choose six) (a) Detect if a spreadsheet has been changed in an unauthorised way(b) Provide confidentiality for a Windows user accessing a Linux web server via a web browser(c) Prevent a user from deletingContinue reading “Tough Questions 21-30”
Tough Questions 11-20
Mobile devices place an emphasis on battery consumption and frequently have limited processing power. What type of encryption is best suited to devices such as this? (a) RSA(b) Diffie-Hellman(c) EAP-TLS(d) PEAP(e) ECC(f) AES(g) Vernam ciphers Answer:(e) ECC Explanation:(a) RSA asymmetric encryption requires long keys and therefore has a high processing overhead(b) Diffie-Hellman is used for key exchange, notContinue reading “Tough Questions 11-20”