Information Security And IT Risk Management 1st Edition by Manish Agrawal – Test Bank

 

To Purchase this Complete Test Bank with Answers Click the link Below

 

https://tbzuiqe.com/product/information-security-and-it-risk-management-1st-edition-by-manish-agrawal-test-bank/

 

If face any problem or Further information contact us At tbzuiqe@gmail.com

 

 

Sample Questions

 

Information security and IT risk management – Question bank

By Manish Agrawal, Alex Campoe and Eric Pierce

  • Chapter 4 – Basic information security model

 

1.   Assets are

1.   a) Resources or information that is to be protected

2.   b) Safeguards used to minimize the impact of threats

3.   c) Capabilities, intentions and attack methods of adversaries to cause harm to assets

4.   d) Weaknesses in an information system that can lead to a compromise of an asset

Answer: (a)

2.   Threats are

1.   a) Safeguards used to minimize the impact of threats

2.   b) Capabilities, intentions and attack methods of adversaries to cause harm to assets

3.   c) Resource or information that is to be protected

4.   d) Weaknesses in an information system that can lead to a compromise of an asset

Answer: (b)

3.   Relative to physical security, information security is challenging because

1.   a) Assets are largely invisible

2.   b) Most assets are easily duplicated

3.   c) Both the above

4.   d) None of the above

Answer: (c)

4.   Vulnerabilities are

1.   a) Safeguards used to minimize the impact of threats

2.   b) Capabilities, intentions and attack methods of adversaries to cause harm to assets

3.   c) Resource or information that is to be protected

4.   d) Weaknesses in an information system that can lead to a compromise of an asset

Answer: (d)

5.   Controls are

1.   a) Safeguards used to minimize the impact of threats

2.   b) Capabilities, intentions and attack methods of adversaries to cause harm to assets

3.   c) Resource or information that is to be protected

4.   d) Weaknesses in an information system that can lead to a compromise of an asset

Answer: (a)

6.   Vulnerabilities in IT systems can be eliminated through secure coding practices

1.   a) True

2.   b) False

Answer: (b)

7.   Models are useful because

1.   a) They highlight resource or information that is to be protected

2.   b) They highlight weaknesses in information systems that can be compromised

3.   c) They draw attention to the essential details of a problem

4.   d) They describe safeguards used to minimize the impact of threats

Answer: (c)

8.   The CVE list is

1.   a) A list of all likely impacts of vulnerabilities

2.   b) A list of all known viruses

3.   c) A list of all known information security firms

4.   d) An inventory of known software vulnerabilities

Answer: (d)

9.   The NVD database

1.   a) Describes likely impacts and measures to remove vulnerabilities

2.   b) A list of all known viruses

3.   c) A list of all known information security firms

4.   d) An inventory of known software vulnerabilities

Answer: (a)

10.                As reported in the chapter, recent trends in vulnerabilities and threats indicate that

1.   a) Increasing numbers of new vulnerabilities are being discovered, and the number of attacks is also going up

2.   b) Decreasing numbers of new vulnerabilities are being discovered, but the number of attacks is going up

3.   c) Decreasing numbers of new vulnerabilities are being discovered, and the number of attacks is also going down

4.   d) Increasing numbers of new vulnerabilities are being discovered, but the number of attacks is going down

Answer: (b)

11.                Zeus and Spyeye are examples of

1.   a) Viruses

2.   b) Vulnerabilities

3.   c) IDEs to create new attacks

4.   d) Systems to defend against attacks

Answer: (c)

12.                A lack of input validation vulnerability refers to a situation where

1.   a) Files are accepted as input without verifying their specifications

2.   b) Input from other users is supplied as output to other users

3.   c) A program puts more data into a storage location than it can hold

4.   d) User input is used without confirming its validity

Answer: (d)

13.                An unrestricted uploads vulnerability refers to a situation where

1.   a) Files are accepted as input without verifying their specifications

2.   b) Input from other users is supplied as output to other users

3.   c) A program puts more data into a storage location than it can hold

4.   d) User input is used without confirming its validity

Answer: (a)

14.                A cross-site scripting vulnerability can occur when

1.   a) Files are accepted as input without verifying their specifications

2.   b) Input from other users is supplied as output to other users

3.   c) A program puts more data into a storage location than it can hold

4.   d) User input is used without confirming its validity

Answer: (b)

15.                A buffer overflow vulnerability refers to a situation where

1.   a) Files are accepted as input without verifying their specifications

2.   b) Input from other users is supplied as output to other users

3.   c) A program puts more data into a storage location than it can hold

4.   d) User input is used without confirming its validity

Answer: (c)

16.                A SQL injection vulnerability is an example of a

1.   a) Unrestricted uploads vulnerability

2.   b) Cross-site scripting vulnerability

3.   c) Buffer overflow vulnerability

4.   d) Lack of input validation vulnerability

Answer: (d)

17.                A missing authorization vulnerability refers to a situation where

1.   a) Users are allowed access to privileged parts of a program without verification of credentials

2.   b) Input from other users is supplied as output to other users

3.   c) A program puts more data into a storage location than it can hold

4.   d) User input is used without confirming its validity

Answer: (a)

18.                Denial of service refers to

1.   a) Programs that propagate through the network without a user’s consent

2.   b) Unauthorized prevention of access to resources

3.   c) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication

4.   d) Code specifically designed to exploit a computer or data, without the user’s consent

Answer: (b)

19.                Phishing refers to

1.   a) Programs that propagate through the network without a user’s consent

2.   b) Unauthorized prevention of access to resources

3.   c) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication

4.   d) Code specifically designed to exploit a computer or data, without the user’s consent

Answer: (c)

20.                Malware refers to

1.   a) Programs that propagate through the network without a user’s consent

2.   b) Unauthorized prevention of access to resources

3.   c) Attempting to compromise a user by masquerading as a trustworthy entity in electronic communication

4.   d) Code specifically designed to exploit a computer or data, without the user’s consent

Answer: (d)

21.                Rootkits are

1.   a) Software used to hide the existence of malicious software on computer systems

2.   b) Exploits that compromise a previously unknown software vulnerability

3.   c) Computers that perform malicious tasks at the direction of a remote controller

4.   d) Manipulating people into performing desired actions

Answer: (a)

22.                Zero-day exploits are

1.   a) Software used to hide the existence of malicious software on computer systems

2.   b) Exploits that compromise a previously unknown software vulnerability

3.   c) Computers that perform malicious tasks at the direction of a remote controller

4.   d) Manipulating people into performing desired actions

Answer: (b)

23.                Zombies are

1.   a) Software used to hide the existence of malicious software on computer systems

2.   b) Exploits that compromise a previously unknown software vulnerability

3.   c) Computers that perform malicious tasks at the direction of a remote controller

4.   d) Manipulating people into performing desired actions

Answer: (c)

24.                Social engineering is

1.   a) Software used to hide the existence of malicious software on computer systems

2.   b) Exploits that compromise a previously unknown software vulnerability

3.   c) Computers that perform malicious tasks at the direction of a remote controller

4.   d) Manipulating people into performing desired actions

Answer: (d)

25.                Physical controls

1.   a) Use non-technical methods of preventing harm

2.   b) Are the security measures built into the information system itself

3.   c) Perform malicious tasks at the direction of a remote controller

4.   d) Manipulate people into performing desired actions

Answer: (a)

Information security and IT risk management – Question bank

By Manish Agrawal, Alex Campoe and Eric Pierce

  • Chapter 7 – Encryption controls

 

1.   Encryption is

1.   a) The transformation of data to produce ciphertext

2.   b) Text that is unintelligible to the reader

3.   c) A sequence of symbols that controls the operations of encipherment and decipherment

4.   d) A well-defined sequence of steps used to describe cryptographic processes

5.   e) An encryption method that uses no keys

Answer: (a)

2.   Ciphertext is

1.   a) The transformation of data to produce ciphertext

2.   b) Text that is unintelligible to the reader

3.   c) A sequence of symbols that controls the operations of encipherment and decipherment

4.   d) A well-defined sequence of steps used to describe cryptographic processes

5.   e) An encryption method that uses no keys

Answer: (b)

3.   The word Cipher is based on an Arabic word, cifr, that means

1.   a) Sender

2.   b) Secret

3.   c) Nothing

4.   d) Receiver

Answer: (c)

4.   The first documented instance of encryption was used by

1.   a) Egyptian pharaoh Tutankhamun

2.   b) Italian inventor Leonardo da Vinci

3.   c) Italian artist Michelangelo

4.   d) Roman Emperor Julius Caesar

Answer: (d)

5.   Cryptanalysis is

1.   a) The art of breaking ciphertext

2.   b) The transformation of data to produce ciphertext

3.   c) The science of creating superior encryption algorithms

4.   d) Text that is unintelligible to the reader

Answer: (a)

6.   A cryptographic algorithm is

1.   a) Symbols that controls encipherment and decipherment

2.   b) A well-defined sequence of steps used to describe cryptographic processes

3.   c) An encryption method that uses no keys

4.   d) Text that is unintelligible to the reader

Answer: (b)

7.   In the context of encryption, a key is

1.   a) A well-defined sequence of steps used to describe cryptographic processes

2.   b) An encryption method that uses no keys

3.   c) A sequence of symbols that controls the operations of encipherment and decipherment

4.   d) Text that is unintelligible to the reader

Answer: (c)

8.   Desirable properties In good encryption algorithms include

1.   a) Generating characters that appear random

2.   b) Generating output that appears to be of random length

3.   c) Changing at least half the bits in the output when even one bit changes in the input

4.   d) All the above

Answer: (d)

9.   Secret key cryptography refers to

1.   a) The use of the same key for both encryption and decryption

2.   b) The use of a secret algorithm for encryption and decryption

3.   c) The use of a secret key only for decryption

4.   d) The use of a secret key for encryption

Answer: (a)

10.                The current standard for secret key encryption is

1.   a) DES (Data Encryption Standard)

2.   b) AES (Advanced Encryption Standard)

3.   c) IDEA International Data Encryption Algorithm)

4.   d) SHA (Secure Hash Algorithm)

Answer: (b)

11.                Public Key cryptography refers to

1.   a) The use of the same key for both encryption and decryption

2.   b) The use of a secret algorithm for encryption and decryption

3.   c) The use of a secret key only decryption

4.   d) The use of a secret key for encryption

Answer: (c)

12.                In using public key encryption, messages are deciphered using

1.   a) A public key

2.   b) A shared secret key

3.   c) Any key

4.   d) A private key

Answer: (d)

13.                Public key encryption is used primarily for

1.   a) Sharing a secret key prior to network transmission

2.   b) Storing data on hard drives

3.   c) Encrypting data during transmission over a network

4.   d) Saving passwords

Answer: (a)

14.                Digital signatures are

1.   a) The transformation of data to produce ciphertext

2.   b) The use of cryptography that allows a user to prove the source and integrity of data

3.   c) Text that is unintelligible to the reader

4.   d) A sequence of symbols that controls the operations of encipherment and decipherment

Answer: (b)

15.                Hash functions use

1.   a) 2 keys

2.   b) 1 key

3.   c) 0 keys

4.   d) Any of the above, depending upon the specific hash algorithm

Answer: (c)

16.                Hash functions are used primarily for

1.   a) Sharing a secret key prior to network transmission

2.   b) Storing data on hard drives

3.   c) Encrypting data during transmission over a network

4.   d) Saving passwords

Answer: (d)

17.                Claude Shannon developed the framework for secrecy known as

1.   a) Confusion diffusion

2.   b) 4P model

3.   c) 4C model

4.   d) Inversion of control

Answer: (a)

18.                Block encryption uses both

1.   a) Relational and Procedural operations

2.   b) Substitution and permutation

3.   c) Keys and hashes

4.   d) Data and storage

Answer: (b)

19.                Electronic Code Book (ECB) is not used for encryption since it has inadequate

1.   a) Licensing flexibility

2.   b) Recovery features

3.   c) Diffusion of confusion

4.   d) Parallelism

Answer: (c)

20.                Public key encryption techniques used in practice are based heavily on

1.   a) Division operations

2.   b) Set operations

3.   c) Extraction operations

4.   d) Modulus operations

Answer: (d)

21.                17 mod 11 is

1.   a) 6

2.   b) 8

3.   c) 7

4.   d) 0

Answer: (a)

22.                The popular encryption method RSA is an example of

1.   a) Secret key encryption

2.   b) Public key encryption

3.   c) Hash functions

4.   d) AES

Answer: (b)

23.                For any given input, the length of its hash out is

1.   a) Always shorter than the input

2.   b) Depends upon the length of the input

3.   c) Always the same

4.   d) Always longer than the input

Answer: (c)

24.                A certificate used in web applications contains the

1.   a) Shared secret key prior to network transmission

2.   b) The hash output of the data to be transmitted

3.   c) Saved password of the end user for recovery

4.   d) Public key of the server and information about the key provider

Answer: (d)

25.                The most common technologies used for secure network communication are

1.   a) VPN and SSL

2.   b) AES and DES

3.   c) PKI and RSA

4.   d) Diffusion and confusion

Answer: (a)

 

Comments

Popular posts from this blog

Illustrated Course Guides Teamwork & Team Building – Soft Skills for a Digital Workplace, 2nd Edition by Jeff Butterfield – Test Bank

International Financial Management, Abridged 12th Edition by Madura – Test Bank