Review Questions

 < Day Day Up > 



1. 

John Doe from the local power and light company calls you and requests access to your secure remote location for a routine meter reading. What do you do?

  1. Let him in. All local regulations give power and light companies access precedence for routine maintenance.

  2. Ask the guard at the front desk what he thinks you should do.

  3. Check your documented access control policy, which might contain an access list. Let him in if he’s on the list. Deny access and call the power company if he is not.

  4. Tell him to say “Open Sesame.”

correct answer = c the answer to this question is based on what your documented access control policy states. in other words, you might have a digital pass system, an acl (access control list), a remote surveillance device, or biometric device that can be used to determine remotely whether the worker should be allowed or denied entry to the remote site. all other choices are invalid.

2. 

Which of the following choices is not a considered a physical security control?

  1. Cryptography.

  2. Mantrap.

  3. Turnstile.

  4. Biometric device.

correct answer = a cryptography is used to transform or encrypt plain text into an unreadable or unidentifiable format known as ciphertext. in order for the encrypted text to be understandable, it must be decrypted. cryptography is not considered a physical security control. mantraps, turnstiles, and biometric devices are considered physical security controls.

3. 

Which of the following choices represent preventive control measures?

  1. Implementing more restrictive file level permissions after a breach.

  2. Antivirus protection and strong passwords.

  3. Reviewing log files and monitoring suspicious activity.

  4. A good backup system.

correct answer = b implementing antivirus protection and strong passwords are examples of preventive controls. implementing more restrictive file level permissions after a breach is considered a corrective control. reviewing log files and monitoring suspicious activity are considered detective controls. a good backup system is a recovery control.

4. 

A security management concept known as the CIA Triad represents what?

  1. Confidentiality, IDEA, Auditing.

  2. Customers, Integrity, Auditing.

  3. Conspiracy, IDEA, Availability.

  4. Confidentiality, Integrity, Availability.

correct answer = d in operational security management terms, the protection of confidentiality, integrity and availability make up what is known as the cia triad. all other choices are invalid.

5. 

What is best way to secure portable devices that contain confidential information?

  1. Use a BIOS-protecting password.

  2. Secure the devices by storing and locking them in cars, vaults, and safes.

  3. Do not allow employees to use portable devices.

  4. Encrypt the data.

correct answer = d laptop computers, pdas (personal data assistants), and cell phones can be easily lost or stolen. the best way to protect the information contained within these units is to use encryption. using a bios password is always a good idea for securing access to a system before the operating system loads. however, it is not the most secure method for protecting data. choices b and c are great ideas. however, they are nonproductive and impractical.

6. 

Which type of fire extinguishing agent holds back water in the pipe with a clapper valve, offering time to shut down the system if you happen to get the fire under control?

  1. CWet pipe.

  2. Dry pipe.

  3. Gas discharge.

  4. Timing pipe.

correct answer = b with a dry pipe system, water is held far back from the nozzle by a clapper valve. if the system detects fire, there remains significant time to shut down the system if the happen to put the fire out before water is needed. a wet pipe system keeps always keeps water in the pipes that lead to the sprinkler head or nozzle. a gas discharge system doesn t use water. timing pipe is an invalid selection.

7. 

Which type of handheld fire extinguisher should never be used to put out a Class A fire?

  1. BC.

  2. ABC.

  3. DC.

  4. ACD.

correct answer = a a class bc fire extinguisher is rated for chemical and electrical fires. it should never be used to extinguish a class a rated fire. an abc extinguisher is rated to put out normal paper or wood burning fires and can be used for a class a fires. selections c and d are invalid classes.

8. 

Which type of wiring is most secure and least susceptible to interference?

  1. CAT5.

  2. Coaxial.

  3. Fiber-optic.

  4. High-quality RJ11.

correct answer = c fiber-optic cable is very secure and is least susceptible to interference or crosstalk. cat5 and coaxial cable can be easily tapped and are more susceptible to electrical or magnetic interference. high-quality rj11 would make a great choice for an analog phone connection but it is irrelevant here.

9. 

Which backup type provides the easiest and fastest restore?

  1. GFS.

  2. Incremental.

  3. Full.

  4. Backup 0.

correct answer = a the answer to this question is a. a gfs (grandfather-father-son) backup strategy using a daily differential backup provides the easiest and fastest restore. with this strategy, the last full and last differential backup tapes are needed to do the restore. all others choices are incorrect. be ready to handle questions similar to this that contain minimal information on the real exam. some of the questions on this exam are going to leave you wondering where is the rest of the information.

10. 

Which type of backup site will allow you to get your business systems and applications up and running in the least amount of time?

  1. Hot site.

  2. Cold site.

  3. Warm site.

  4. Fiber-optic site.

correct answer = a a hot site is considered a site that can provide full business functionality in a very short time. it is the most functional site. a cold site doesn t have any equipment such as servers or workstations on site, and there is usually no active connectivity to external networks in place. a warm site has more functionality than a cold site but would need more equipment and associated components to equal that of a hot site. a fiber-optic site sounds real good; unfortunately, it is an invalid selection.

11. 

What should be your first step when creating a DRP (Disaster Recovery Plan)?

  1. Determine which type of site will be used.

  2. Define the goals the plan is expected to achieve.

  3. Identification of a disaster recovery response team.

  4. Identifying important information to back up.

  5. None of the above.

correct answer = b be ready for this type of question on the real exam. the first step needed when creating a comprehensive drp is defining the goals that the plan will achieve. this will usually include the identification and definition of what is considered to be a disaster or threat to your business. choices a, c, and d are all items that should be included in the drp. however, they are not considered the first step in this process.

12. 

What RAID level provides the best level of fault tolerance and performance?

  1. RAID 32.

  2. RAID 0.

  3. RAID 1.

  4. RAID 5.

  5. None of the above.

correct answer = d raid level 5 places parity information across all disks in an array. it provides the best combination of fault tolerance and performance of the popular raid implementations. raid 32 is an invalid selection. raid 0 is not fault tolerant. although raid 1 or disk mirroring is fault tolerant, it is not considered to provide the best level of protection and performance of the raid levels.

13. 

Which statement best describes a security policy?

  1. Once documented, it is set in stone and never changes.

  2. Does not typically include an “Acceptable Use” statement or clause.

  3. It is a living document that is never completed or finished.

  4. Should only be followed by security personnel.

  5. None of the above.

correct answer = c a security policy is never completed. it is a living document that requires continuous updates to reflect changes occurring over the lifetime of a business. most security policies include an employee acceptable use policy statement or clause. a security policy should be provided to all employees, vendors, and third parties involved with the particular business.

14. 

What is the activity of sifting through someone else’s trash in order to gain confidential information called?

  1. Rude and lascivious.

  2. Custodial engineering.

  3. Social engineering.

  4. Dumpster diving.

  5. None of the above.

correct answer = d dumpster diving is going through someone else s trash with the hopes of finding information such as names, id s, phone lists, passwords, network information, pins, account numbers, and other information that can be used for social engineering attacks and access to information systems. all other answers are invalid.

15. 

How should confidential company information that is stored on electronic media be handled if it is no longer needed?

  1. It should be thrown in the dumpster.

  2. It should be encrypted and then thrown in the dumpster.

  3. It should never be thrown away. It is company-confidential.

  4. It should be given to the security guard.

  5. None of the above.

correct answer = e any company information that is no longer needed should be disposed of properly. paper documents should be cross-shredded. information that is stored on electronic media should be erased. stay alert when taking the exam. there will be many common-sense questions similar to this that you cannot afford to miss.

16. 

What is Two-Factor SSO?

  1. Using a user ID and a password to authenticate.

  2. Using a biometric device to authenticate.

  3. Using a user ID\password combination and a retina scanner for authentication.

  4. Using a client/server environment to authenticate.

  5. None of the above.

correct answer = c with two-factor sso, a user provides an id and a password combination and is also required to authenticate with a token or biometric device such as a retina or fingerprint scanner. using a user id and a password to authenticate is an example of plain single sign-on (sso). using a biometric device alone is not considered two-factor. using a client/server environment to authenticate is typically a prerequisite that provides an environment for the implementation of sso and two-factor sso.

17. 

Which of the following are important considerations concerning computer forensics?

  1. Secure third-party storage.

  2. Following a chain of custody.

  3. Using rubber gloves and sealed containers.

  4. Proper collection and preservation of data for evidence.

  5. All of the above.

correct answer = e all choices are valid concerning computer forensics.

18. 

Which type of risk analysis uses controls such as deterrent, preventive, corrective, and detective?

  1. Ultimate risk analysis.

  2. Quantitative risk analysis.

  3. Qualitative risk analysis.

  4. Quality control risk analysis.

  5. None of the above.

correct answer = c qualitative risk analysis uses deterrent, preventive, corrective, and detective controls to offset risk. with quantitative risk analysis, the risks are guessed and money is appropriated as a means to offset or take care of the aftermath if an event should occur. all other choices are invalid.

19. 

What is the formula used to calculate annual financial expected loss?

  1. ARO + ALE=SLE .

  2. ALE-ARO=SLE.

  3. ALE ï SLE=ARO.

  4. SLE ï ARO=ALE.

  5. None of the above.

correct answer = d in order to produce an annualized loss expectancy (ale), you must multiply the single loss expectancy (sle) by the annualized rate of occurrence (aro). all other choices are invalid.

20. 

According to security roles and responsibilities, whose role includes the responsibilities of backups and restores?

  1. Manager.

  2. Owner.

  3. Custodian.

  4. User.

  5. None of the above.

correct answer = c custodian duties include the verification of system backups and restores as well as keeping updated documentation supporting testing and production efforts. management is responsible for ensuring that all employees follow security policies and practices and protecting all company assets. owners responsibilities include determining the classification level of data, making changes to the classification level, and assigning or delegating who will be responsible for data and the security of data. users should be responsible and accountable for the data they work with.

21. 

Concerning government and commercial data classification, which two data categories describe grave or extreme damage that can result if the public accesses this information?

  1. Confidential and Top-Secret.

  2. Sensitive and Unclassified.

  3. Secret and Sensitive.

  4. Secret and Sensitive but Unclassified.

  5. None of the above.

correct answer = a information that is commercially classified as confidential might cause extreme damage if made public. information that is governmentally classified as top-secret might cause grave or extreme damage if disclosed. these are the most classified of the two data classification categories. all other choices are invalid.

Answers

1. 

Correct answer = C

The answer to this question is based on what your documented access control policy states. In other words, you might have a digital pass system, an ACL (Access Control List), a remote surveillance device, or biometric device that can be used to determine remotely whether the worker should be allowed or denied entry to the remote site. All other choices are invalid.

2. 

Correct answer = A

Cryptography is used to transform or encrypt plain text into an unreadable or unidentifiable format known as ciphertext. In order for the encrypted text to be understandable, it must be decrypted. Cryptography is not considered a physical security control. Mantraps, turnstiles, and biometric devices are considered physical security controls.

3. 

Correct answer = B

Implementing antivirus protection and strong passwords are examples of preventive controls. Implementing more restrictive file level permissions after a breach is considered a corrective control. Reviewing log files and monitoring suspicious activity are considered detective controls. A good backup system is a recovery control.

4. 

Correct answer = D

In operational security management terms, the protection of confidentiality, integrity and availability make up what is known as the CIA Triad. All other choices are invalid.

5. 

Correct answer = D

Laptop computers, PDAs (Personal Data Assistants), and cell phones can be easily lost or stolen. The best way to protect the information contained within these units is to use encryption. Using a BIOS password is always a good idea for securing access to a system before the operating system loads. However, it is not the most secure method for protecting data. Choices B and C are great ideas. However, they are nonproductive and impractical.

6. 

Correct answer = B

With a dry pipe system, water is held far back from the nozzle by a clapper valve. If the system detects fire, there remains significant time to shut down the system if the happen to put the fire out before water is needed. A wet pipe system keeps always keeps water in the pipes that lead to the sprinkler head or nozzle. A gas discharge system doesn’t use water. Timing pipe is an invalid selection.

7. 

Correct answer = A

A Class BC fire extinguisher is rated for chemical and electrical fires. It should never be used to extinguish a Class A rated fire. An ABC extinguisher is rated to put out normal paper or wood burning fires and can be used for a Class A fires. Selections C and D are invalid classes.

8. 

Correct answer = C

Fiber-optic cable is very secure and is least susceptible to interference or crosstalk. CAT5 and coaxial cable can be easily tapped and are more susceptible to electrical or magnetic interference. High-quality RJ11 would make a great choice for an analog phone connection but it is irrelevant here.

9. 

Correct answer = A

The answer to this question is A. A GFS (Grandfather-Father-Son) backup strategy using a daily differential backup provides the easiest and fastest restore. With this strategy, the last full and last differential backup tapes are needed to do the restore. All others choices are incorrect. Be ready to handle questions similar to this that contain minimal information on the real exam. Some of the questions on this exam are going to leave you wondering where is the rest of the information.

10. 

Correct answer = A

A hot site is considered a site that can provide full business functionality in a very short time. It is the most functional site. A cold site doesn’t have any equipment such as servers or workstations on site, and there is usually no active connectivity to external networks in place. A warm site has more functionality than a cold site but would need more equipment and associated components to equal that of a hot site. A fiber-optic site sounds real good; unfortunately, it is an invalid selection.

11. 

Correct answer = B

Be ready for this type of question on the real exam. The first step needed when creating a comprehensive DRP is defining the goals that the plan will achieve. This will usually include the identification and definition of what is considered to be a disaster or threat to your business. Choices A, C, and D are all items that should be included in the DRP. However, they are not considered the first step in this process.

12. 

Correct answer = D

RAID level 5 places parity information across all disks in an array. It provides the best combination of fault tolerance and performance of the popular RAID implementations. RAID 32 is an invalid selection. RAID 0 is not fault tolerant. Although RAID 1 or disk mirroring is fault tolerant, it is not considered to provide the best level of protection and performance of the RAID levels.

13. 

Correct answer = C

A security policy is never completed. It is a living document that requires continuous updates to reflect changes occurring over the lifetime of a business. Most security policies include an employee Acceptable Use policy statement or clause. A security policy should be provided to all employees, vendors, and third parties involved with the particular business.

14. 

Correct answer = D

Dumpster diving is going through someone else’s trash with the hopes of finding information such as names, ID’s, phone lists, passwords, network information, PINs, account numbers, and other information that can be used for social engineering attacks and access to information systems. All other answers are invalid.

15. 

Correct answer = E

Any company information that is no longer needed should be disposed of properly. Paper documents should be cross-shredded. Information that is stored on electronic media should be erased. Stay alert when taking the exam. There will be many common-sense questions similar to this that you cannot afford to miss.

16. 

Correct answer = C

With Two-factor SSO, a user provides an ID and a password combination and is also required to authenticate with a token or biometric device such as a retina or fingerprint scanner. Using a user ID and a password to authenticate is an example of plain Single Sign-on (SSO). Using a biometric device alone is not considered Two-Factor. Using a client/server environment to authenticate is typically a prerequisite that provides an environment for the implementation of SSO and Two-Factor SSO.

17. 

Correct answer = E

All choices are valid concerning computer forensics.

18. 

Correct answer = C

Qualitative risk analysis uses deterrent, preventive, corrective, and detective controls to offset risk. With quantitative risk analysis, the risks are guessed and money is appropriated as a means to offset or take care of the aftermath if an event should occur. All other choices are invalid.

19. 

Correct answer = D

In order to produce an Annualized Loss Expectancy (ALE), you must multiply the Single Loss Expectancy (SLE) by the Annualized Rate of Occurrence (ARO). All other choices are invalid.

20. 

Correct answer = C

Custodian duties include the verification of system backups and restores as well as keeping updated documentation supporting testing and production efforts. Management is responsible for ensuring that all employees follow security policies and practices and protecting all company assets. Owners’ responsibilities include determining the classification level of data, making changes to the classification level, and assigning or delegating who will be responsible for data and the security of data. Users should be responsible and accountable for the data they work with.

21. 

Correct answer = A

Information that is commercially classified as Confidential might cause extreme damage if made public. Information that is governmentally classified as Top-Secret might cause grave or extreme damage if disclosed. These are the most classified of the two data classification categories. All other choices are invalid.



 < Day Day Up > 



The Security+ Exam Guide (TestTaker's Guide Series)
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net