Choose the correct data encryption standard in CISSP Flashcards

100 cards   |   Total Attempts: 377
  

Related Topics

Cards In This Set

Front Back
Which symmetric cipher is a Feistal-type block cipher with 64-128 bit blocks? A. CAST

B. SAFER

C. Blowfish

D. Twofish
NOT D. Twofish
Which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises? A. Evacuation drill

B. Walk-through drill

C. Structured walk-through test

D. Table top exercise
C. Structured walk-through test
Reduction analysis: A. Reduces the system's risk to a given target level by effectively applying countermeasures

B. Reduces the system's threats to a given target level by analyzing those threats

C. Is a planned activity for identifying and assessing threats and vulnerabilities

D. Identifies and reduces exploitable vulnerabilities
NOT B. Reduces the system's threats to a given target level by analyzing those threats
Which of the following statements about incremental backup are true? (CHECK ALL THAT APPLY) A.It is the fastest method of backing up data B.It backs up only the files changed since the most recent backup and clears the archive bit C.A full restoration of data will be slower, since all increments must be restored D.It is the slowest method for taking a data backup
A.It is the fastest method of backing up data B.It backs up only the files changed since the most recent backup and clears the archive bit C.A full restoration of data will be slower, since all increments must be restored
Which of the following is true for Interface testing? A. Offers flexible usage and input combos

B. Promotes user feedback

C. Has decreased reliability

D. Is effective in large environment simulations
D. Is effective in large environment simulations
Which of the following electronically stored information (ESI) are not considered reasonably accessible? A. Manual-access disks

B. Backup tapes for disaster recovery

C. Hard drives

D. Auto-access optical disks
B. Backup tapes for disaster recovery
Which type of law is derived from court decisions and codification of British law dating back to the 12th century? A. Common Law

B. Criminal Law

C. Tort Law

D. Administrative Law
NOT C. Tort Law
Which symmetric cipher is used in Bluetooth? A. SAFER

B. Blowfish

C. RC5

D. Twofish
A. SAFER
A minimum security baseline is a set of standards: A. That are applied enterprise wide to ensure a consistent level of compliance.

B. That are applied to a minimum set of controls to ensure a minimum level of compliance

C. That are based on regulatory requirements

D. That are not based on a systematic review of risks
A. That are applied enterprise wide to ensure a consistent level of compliance.
With public key cryptography, confidential messages with proof of origin are encrypted with the sender's private key and the public key of the recipient. A. TRUE

B. FALSE
A. TRUE
Information will not be disclosed to any unauthorized person on a local network via which of the following cryptographic system services? A. Authentication

B. Non-Repudiation

C. Integrity

D. Confidentiality
D. Confidentiality
Many organizations purchase insurance policies to provide various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques are being employed? A. Risk avoidance

B. Risk transfer

C. Risk acceptance

D. Risk insurance
B. Risk transfer
Defining technology security architecture in relationship with other technology domains is a benefit of the enterprise security architecture. A. TRUE

B. FALSE
A. TRUE
Weaknesses of TELNET include which of the following? (SELECT ALL THAT APPLY)A.Emergency services location problem B.Limited to UserID/password authentication C.No encryption+ D.Usernames/passwords can be brute forced
NOT B.Limited to UserID/password authenticationD.Usernames/passwords can be brute forced
You are building a personal e-commerce site and seek a simple security solution which does not require each customer to have an individual key. Which of the following encryption method below is your best solution? A. Asymmetric Encryption

B. Symmetric Encryption

C. S/MIME

D. PGP
B. Symmetric Encryption