Information Security MCQ

1. The concept of creating safer and more efficient equipment is called __________.

Answer

Correct Answer: Ergonomics

Note: This Question is unanswered, help us to find answer for this one

2. The concept of competitive _________ refers to falling behind the competition.

Answer

Correct Answer: Disadvantage

Note: This Question is unanswered, help us to find answer for this one

3. _____, a risk control strategy, eliminates risks by adding protective safeguards.

Answer

Correct Answer: ​Avoidance

Note: This Question is unanswered, help us to find answer for this one

4. _____________________ are tools that filter offensive content.

Answer

Correct Answer: Technology Protection Measures (TPM)

Note: This Question is unanswered, help us to find answer for this one

5. Every information system involves ____

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

6. If human action is required, the control is considered _______________.

Answer

Correct Answer: Manual

Note: This Question is unanswered, help us to find answer for this one

7. The architecture of a(n) ____________________ firewall provides a dmz.

Answer

Correct Answer: Screened Subnet

Note: This Question is unanswered, help us to find answer for this one

8. The advent of optical discs was made possible by developments in ____ technology.

Answer

Correct Answer: Laser

Note: This Question is unanswered, help us to find answer for this one

9. The ability to detect a target computers __________ is very valuable to an attacker.

Answer

Correct Answer: Operating system

Note: This Question is unanswered, help us to find answer for this one

10. The ____________________ port is also known as a switched port analysis (span) port or mirror port.

Answer

Correct Answer: Monitoring

Note: This Question is unanswered, help us to find answer for this one

11. Some policies may need a(n) ____________________ indicating their expiration date.

Answer

Correct Answer: Sunset Clause.

Note: This Question is unanswered, help us to find answer for this one

12. How your organization responds to risk reflects the value it puts on its ___________.

Answer

Correct Answer: Assets

Note: This Question is unanswered, help us to find answer for this one

13. An internet-based crime is referred to as a(n) ____ crime.

Answer

Correct Answer: Cyber

Note: This Question is unanswered, help us to find answer for this one

14. Aes implements a block cipher called the rijndael block cipher. _________________________

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

15. A(n) _________________________ is typically carried concealed.

Answer

Correct Answer: Identification card

Note: This Question is unanswered, help us to find answer for this one

16. A mans home is his castle is an example of: ___________

Answer

Correct Answer: Territoriality

Note: This Question is unanswered, help us to find answer for this one

17. According to the text, a _____ is the quintessential gis.

Answer

Correct Answer: Map

Note: This Question is unanswered, help us to find answer for this one

18. A ______ is, traditionally, made up of a series of eight 0 and 1 values.

Answer

Correct Answer: Byte

Note: This Question is unanswered, help us to find answer for this one

19. The two main places to filter spam are _____.

Answer

Correct Answer: At the host itself and the server

Note: This Question is unanswered, help us to find answer for this one

20. A _________ is the likelihood that a loss will occur.

Answer

Correct Answer: Risk

Note: This Question is unanswered, help us to find answer for this one

21. A _____ relationship exists when an association is maintained within a single entity.

Answer

Correct Answer: Unary

Note: This Question is unanswered, help us to find answer for this one

22. Multimedia is anything that involves one or more of the following except ________.

Answer

Correct Answer: Browsers.

Note: This Question is unanswered, help us to find answer for this one

23. Ethics are the moral attitudes or customs of a particular group. _________________________

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

24. A ___________ is used to transmit hidden information within normal network traffic.

Answer

Correct Answer: Covert channel

Note: This Question is unanswered, help us to find answer for this one

25. A(n) ____________________ is a potential weakness in an asset or its defensive control(s).

Answer

Correct Answer: Vulnerability

Note: This Question is unanswered, help us to find answer for this one

26. All of the following are enterprise social networks or platforms except ________.

Answer

Correct Answer: Salesforce

Note: This Question is unanswered, help us to find answer for this one

27. __________ is the process of classifying idps alerts so that they can be more effectively managed.

Answer

Correct Answer: Alarm filtering

Note: This Question is unanswered, help us to find answer for this one

28. __________ is a continuous process designed to keep all personnel vigilant.

Answer

Correct Answer: Education

Note: This Question is unanswered, help us to find answer for this one

29. The __________ is the difference between an organizations observed and desired performance.

Answer

Correct Answer: Performance gap

Note: This Question is unanswered, help us to find answer for this one

30. The senior technology officer is typically the chief ____________________ officer.

Answer

Correct Answer: Information

Note: This Question is unanswered, help us to find answer for this one

31. Raid ____ drives can be hot swapped.

Answer

Correct Answer: 5

Note: This Question is unanswered, help us to find answer for this one

32. Information security policies would be ineffective without _____ and _____.

Answer

Correct Answer: Audit; enforcement

Note: This Question is unanswered, help us to find answer for this one

33. A signature-based idps is sometimes called a(n) ____________________-based idps.

Answer

Correct Answer: Knowledge

Note: This Question is unanswered, help us to find answer for this one

34. A famous study entitled protection analysis: final report was published in ____.

Answer

Correct Answer: 1978

Note: This Question is unanswered, help us to find answer for this one

35. A(n) ____ attack is a hacker using a personal computer to break into a system.

Answer

Correct Answer: Direct

Note: This Question is unanswered, help us to find answer for this one

36. _________ addresses are sometimes called electronic serial numbers or hardware addresses.

Answer

Correct Answer: MAC

Note: This Question is unanswered, help us to find answer for this one

37. ____ may be considered a form of physical protection.

Answer

Correct Answer: Surveillance

Note: This Question is unanswered, help us to find answer for this one

38. Idps, an acronym for ____________________ system, is a network burglar alarm.

Answer

Correct Answer: Intrusion detection and prevention

Note: This Question is unanswered, help us to find answer for this one

39. Most digital forensic teams have a prepacked field kit, also known as a(n) ____.

Answer

Correct Answer: Jump bag.

Note: This Question is unanswered, help us to find answer for this one

40. A(n) ____ attack is a method of combining attacks with rootkits and back doors.

Answer

Correct Answer: Hybrid

Note: This Question is unanswered, help us to find answer for this one

41. ____ is a common indicator of a dos attack.

Answer

Correct Answer: User reports of system unavailability

Note: This Question is unanswered, help us to find answer for this one

42. The ____ team is responsible for reestablishing connectivity between systems and to the internet.

Answer

Correct Answer: Network recovery

Note: This Question is unanswered, help us to find answer for this one

43. The ____ team is responsible for recovering and reestablishing operating systems (oss).

Answer

Correct Answer: Systems recovery

Note: This Question is unanswered, help us to find answer for this one

44. One way to identify a particular digital item (collection of bits) is by means of a(n) ____.

Answer

Correct Answer: Cryptographic hash

Note: This Question is unanswered, help us to find answer for this one

45. Incident analysis resources include network diagrams and lists of ____, such as database servers.

Answer

Correct Answer: Critical assets

Note: This Question is unanswered, help us to find answer for this one

46. If an intruder can ____ a device, then no electronic protection can deter the loss of information.

Answer

Correct Answer: Physically access

Note: This Question is unanswered, help us to find answer for this one

47. An ____ may escalate into a disaster when it grows in scope and intensity.

Answer

Correct Answer: Incident

Note: This Question is unanswered, help us to find answer for this one

48. A ____ is an agency that provides physical facilities in the event of a disaster for a fee.

Answer

Correct Answer: Service bureau

Note: This Question is unanswered, help us to find answer for this one

49. ____ is the determination of the initial flaw or vulnerability that allowed an incident to occur.

Answer

Correct Answer: Root cause Analysis

Note: This Question is unanswered, help us to find answer for this one

50. A recommended practice for the implementation of the physical ir plan is to select a ____ binder.

Answer

Correct Answer: Red

Note: This Question is unanswered, help us to find answer for this one

51. Objective measures of the user support or help desk operation are called ____.

Answer

Correct Answer: Performance statistics

Note: This Question is unanswered, help us to find answer for this one

52. In a project schedule, the variable that has the least amount of flexibility is _____.

Answer

Correct Answer: Time

Note: This Question is unanswered, help us to find answer for this one

53. ____ tags are one type of real-time location system.

Answer

Correct Answer: GPS

Note: This Question is unanswered, help us to find answer for this one

54. ____ is the last phase of the six-phase crisp-dm method.

Answer

Correct Answer: Deployment.

Note: This Question is unanswered, help us to find answer for this one

55. A(n) ________ will stipulate what an employee should do when he notices something like a virus.

Answer

Correct Answer: Incident-response plan

Note: This Question is unanswered, help us to find answer for this one

56. __________ sensors project and detect an infrared beam across an area.

Answer

Correct Answer: Photoelectric

Note: This Question is unanswered, help us to find answer for this one

57. ____ attacks are responsible for half of all malware delivered by web advertising.

Answer

Correct Answer: Fake antivirus

Note: This Question is unanswered, help us to find answer for this one

58. ______ refers to the deliberate falsification of information.

Answer

Correct Answer: Disinformation

Note: This Question is unanswered, help us to find answer for this one

59. A centralized directory of digital certificates is called a(n) _____.

Answer

Correct Answer: Certificate Repository (CR).

Note: This Question is unanswered, help us to find answer for this one

60. The ability to work on files at the same time as others is called ____.

Answer

Correct Answer: Coauthor

Note: This Question is unanswered, help us to find answer for this one

61. _____ refers to a situation in which keys are managed by a third party, such as a trusted ca.

Answer

Correct Answer: Key escrow

Note: This Question is unanswered, help us to find answer for this one

62. ____ apps can allow you to lock your mobile device and sim card remotely.

Answer

Correct Answer: Mobile security

Note: This Question is unanswered, help us to find answer for this one

63. Most guards have clear __________ that help them to act decisively in unfamiliar situations.

Answer

Correct Answer: SOPs

Note: This Question is unanswered, help us to find answer for this one

64. The most sophisticated locks are __________ locks.

Answer

Correct Answer: Biometric.

Note: This Question is unanswered, help us to find answer for this one

65. One of the leading causes of damage to sensitive circuitry is __________.

Answer

Correct Answer: ESD

Note: This Question is unanswered, help us to find answer for this one

66. Class __________ fires are safely extinguished with non-conducting agents only.

Answer

Correct Answer: C

Note: This Question is unanswered, help us to find answer for this one

search