Выбрать главу

Symmetric cryptography uses the same key for both encryption and decryption, whereas asymmetric cryptography uses separate keys for encryption and decryption, or to digitally sign and verify a signature. Key rollover is the process of generating and using a new key (symmetric or asymmetric key pair) to replace one already in use.

211. Which of the following must be manually keyed into an automated IT resources inventory tool used in patch management to respond quickly and effectively?

a. Connected network port

b. Physical location

c. Software configuration

d. Hardware configuration

211. b. Although most information can be taken automatically from the system data, the physical location of an IT resource must be manually entered. Connected network port numbers can be taken automatically from the system data. Software and hardware configuration information can be taken automatically from the system data.

212. Regarding a patch management program, which of the following is not an example of a threat?

a. Exploit scripts

b. Worms

c. Software flaws

d. Viruses

212. c. Software flaw vulnerabilities cause a weakness in the security of a system. Threats are capabilities or methods of attack developed by malicious entities to exploit vulnerabilities and potentially cause harm to a computer system or network. Threats usually take the form of exploit scripts, worms, viruses, rootkits, exploits, and Trojan horses.

213. Regarding a patch management program, which of the following does not always return the system to its previous state?

a. Disable

b. Uninstall

c. Enable

d. Install

213. b. There are many options available to a system administrator in remediation testing. The ability to “undo” or uninstall a patch should be considered; however, even when this option is provided, the uninstall process does not always return the system to its previous state. Disable temporarily disconnects a service. Enable or install is not relevant here.

214. Regarding media sanitization, degaussing is not effective for which of the following?

a. Nonmagnetic media

b. Damaged media

c. Media with large storage capacity

d. Quickly purging diskettes

214. a. Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt the recorded magnetic domains. It is not effective for purging nonmagnetic media (i.e., optical media), such as compact discs (CD) and digital versatile discs (DVD). However, degaussing can be an effective method for purging damaged media, for purging media with exceptionally large storage capacities, or for quickly purging diskettes.

215. Which of the following is the ultimate form of media sanitization?

a. Disposal

b. Clearing

c. Purging

d. Destroying

215. d. Media destruction is the ultimate form of sanitization. After media are destroyed, they cannot be reused as originally intended, and that information is virtually impossible to recover or prohibitively expensive from that media. Physical destruction can be accomplished using a variety of methods, including disintegration, incineration, pulverization, shredding, melting, sanding, and chemical treatment.

216. Organizations that outsource media sanitization work should exercise:

a. Due process

b. Due law

c. Due care

d. Due diligence

216. d. Organizations can outsource media sanitization and destruction if business and security management decide this would be the most reasonable option for maintaining confidentiality while optimizing available resources. When choosing this option, organizations exercise due diligence when entering into a contract with another party engaged in media sanitization. Due diligence requires organizations to develop and implement an effective security program to prevent and detect violation of policies and laws.

Due process means each person is given an equal and a fair chance of being represented or heard and that everybody goes through the same process for consideration and approval. It means all are equal in the eyes of the law. Due law covers due process and due care. Due care means reasonable care in promoting the common good and maintaining the minimal and customary practices.

217. Redundant arrays of independent disks (RAID) provide which of the following security services most?

a. Data confidentiality

b. Data reliability

c. Data availability

d. Data integrity

217. b. Forensic investigators are encountering redundant arrays of independent disks (RAID) systems with increasing frequency as businesses elect to utilize systems that provide greater data reliability. RAID provides data confidentiality, data availability, and data integrity security services to a lesser degree than data reliability.

218. The fraud triangle includes which of the following elements?

a. Pressure, opportunity, and rationalization

b. Technique, target, and time

c. Intent, means, and environment

d. Place, ability, and need

218. a. Pressure includes financial and nonfinancial types, and it could be real or perceived. Opportunity includes real or perceived categories in terms of time and place. Rationalization means the illegal actions are consistent with the perpetrator’s personal code of conduct or state of mind.

219. When a system preserves a secure state, during and after a failure is called a:

a. System failure

b. Fail-secure

c. Fail-access

d. System fault

219. b. In fail-secure, the system preserves a secure condition during and after an identified failure. System failure and fault are generic and do not preserve a secure condition like fail-secure. Fail-access is a meaningless term here.

220. Fault-tolerance systems provide which of the following security services?

a. Confidentiality and integrity

b. Integrity and availability

c. Availability and accountability

d. Accountability and confidentiality

220. b. The goal of fault-tolerance systems is to detect and correct a fault and to maintain the availability of a computer system. Fault-tolerance systems play an important role in maintaining high data and system integrity and in ensuring high-availability of systems. Examples include disk mirroring and server mirroring techniques.

221. What do fault-tolerant hardware control devices include?