Many businesses believe that if they purchase enough equipment like Firewalls, IPS/IDS, Antivirus’s etc, they can create a secure infrastructure. These type of security products are just some of the tools available to assist in protecting a network and its data. It is also important to keep in mind that no product will create a secure organization by itself. Security is a process; there is no tool that you can set and forget.
You may also read:
- Information Security and Risk Assessment MCQ With Answers – Part 1
- Information Security and Risk Assessment MCQ With Answers – Part 2
- Information Security and Risk Assessment MCQ With Answers – Part 3
- Information Security and Risk Assessment MCQ With Answers – Part 4
- Information Security and Risk Assessment MCQ With Answers – Part 5
- Information Security and Risk Assessment MCQ With Answers – Part 6
- Information Security and Risk Assessment MCQ With Answers – Part 7
- Information Security and Risk Assessment MCQ With Answers – Part 8
67. Which of the following is often a disadvantage of using a closed system?
- Lack of end user support.
- Lack of product functionality.
- The source code cannot be verified.
- The source code is provided by the Internet community at large.
68. Which of the following is an advantage of an open system?
- End-user support.
- The source code can be verified.
- Difficulty in management.
- All users are always permitted to access the system.
69. What would be a disadvantage of deploying a proxy-based firewall?
- Proxy-based firewalls may not support custom applications.
- Proxy-based firewalls inspect to only the network layer of the OSI model.
- Proxy-based firewalls cannot block unwanted traffic.
- Proxy-based firewalls do not provide network address translation.
70. Which of the following is true of a stateful inspection firewall?
- Stateful inspection firewalls protect through all layers of the OSI model.
- Stateful inspection firewalls support more custom applications than other firewalls.
- Stateful inspection firewalls are faster then other firewalls.
- Stateful inspection firewalls do not provide network address translation.
71. Which of the following is true regarding a packet filter firewall?
- Packet filter firewalls provide more protection than other firewalls.
- Packet filter firewalls provide protection through the entire OSI model.
- Packet filter firewalls do not provide network address translation.
- Packet filter firewalls provide less protection than other firewalls.
72. Which of the following would be an advantage to deploying public key (asymmetric) as opposed to private key (symmetric) encryption technologies?
- Public key is more scalable.
- Public key encryption is faster.
- Public key requires less infrastructure.
- Private key is easier on the end-user community.
73. Digital signatures encrypt the message hash with which of the following keys?
- Sender’s public key
- Sender’s private key
- Receiver’s public key
- Receiver’s private key
74. What term is best defined as a model used to determine the security and functionality of a proposed project?
- Prototype
- Checkpoint
- Journaling
- Service level agreement
75. What is an advantage in performing a vulnerability assessment over a penetration test?
- Penetration tests test the entire network.
- Vulnerability assessments compromise a system or network.
- Vulnerability assessments are a structured repeatable test.
- Vulnerability assessments are faster to conduct than penetration testing.
76. What advantage does discretionary access control have over mandatory access control?
- Mandatory access control is easier to implement.
- Discretionary access control uses extensive labeling.
- Discretionary access control has less administrative overhead.
- Discretionary access control is determined by policy.
77. Which of the following technologies protects the confidentiality of information by embedding the message into an image or music file?
- Public key cryptography
- Private key cryptography
- Digital signatures
- Steganography
78. Which of the following algorithms is a public key algorithm?
- DES
- AES
- RC4
- RSA
79. Two-factor authentication can be established by combining something you have, you are, and which of the following terms?
- You know.
- You read.
- You touch.
- You need.
80. Which of the following can be a security concern with hostbased single-sign-on implementations?
- Passwords are often stored in plaintext.
- Passwords are often transmitted in plaintext.
- The authentication host can be a single point of failure.
- Lack of scalability.
81. A Message Authentication Code (MAC) is a message digest encrypted with which of the following keys?
- The sender’s public key
- The session key
- The receiver’s public key
- The server’s public key
82. Message hashes provide which of the following principles of information security management?
- Integrity
- Confidentiality
- Availability
- Authentication
83. Which of the following terms is best defined as a project to identify the threats that exist over key information and information technology?
- Vulnerability assessment
- Penetration test
- Threat analysis
- System development life cycle
84. Key escrow is an example of which of the following security principles?
- Split knowledge
- Two-factor authentication
- Need to know
- Least privilege
85. Which of the following algorithms is an example of a one-time pad?
- DES
- AES
- RSA
- RC4
86. A one-time pad differs from other symmetric key algorithms in that:
- A new key is never exchanged.
- The key is used for one message and then discarded.
- The length of the key can be longer than for other algorithms.
- The key dynamically regenerates.
87. Which of the following terms relates to increasing the integrity of information on a system?
- Fault tolerance
- Fail over
- Checkpoint
- Host-based intrusion detection
88. Which of the following processes comes at the end of the system development life cycle?
- Accreditation
- Logical configuration
- Development
- Certification
89. Public key cryptographic algorithms can be used for encryption and
- Message authentication codes
- Digital signatures
- Message hashing
- Message integrity checks
90. What is the first step in the system development life cycle?
- Perform a business impact analysis.
- Perform a penetration test.
- Perform a vulnerability assessment.
- Perform a risk analysis.
91. When should security become involved in the systems development life cycle?
- Prior to implementation
- Prior to all audits
- During requirements development
- During development
92. To implement the results of a risk assessment, the information security manger should assign responsibilities and
- Define an implementation schedule.
- Define an vulnerability matrix.
- Define a system development life cycle.
- Define a matrix for prototyping.
93. When comparing the security of wireless networks with traditional or cabled networking:
- Wired networking provides more points for potential eavesdropping.
- Eavesdropping is not possible on a wireless network.
- Wired networking provides some protection from eavesdropping.
- Eavesdropping is not possible on a wireless network.
94. In order to determine the metrics for your network you will need to begin with a measurement of current network conditions. This is called a
- Threat assessment
- Baseline
- Risk assessment
- Prototype
95. Which of the following can be a disadvantage of using a centralized access control system?
- Lack of consistent administration.
- Lack of resource control.
- Difficulty in synchronizing account information.
- It can create a single point of failure.
96. A formal acceptance, by management, of a third-party review of the security controls of a system, network, or application is:
- Certification
- Authentication
- Accreditation
- Classification
97. Prior to development, to determine possible exposure points to a new application in your organization the information security manager would perform a
- Vulnerability assessment
- Business impact analysis
- Risk assessment
- Penetration test
98. Which of the following technologies or standards would apply to authenticating a wireless network connection?
- Wired equivalent privacy
- 802.11b
- 802.11a
- 802.1x
99. Wired Equivalent Privacy (WEP) is a control that increases which of the basic principles of information security management?
- Confidentiality
- Integrity
- Availability
- Authenticity
You may also like:
- Top 30 Linux Questions (MCQs) with Answers and Explanations
- 75 Important Cybersecurity Questions (MCQs with Answers)
- 260 One-Liner Information Security Questions and Answers for Fast Learning
- Top 20 HTML5 Interview Questions with Answers
- 80 Most Important Network Fundamentals Questions With Answers
- 100 Most Important SOC Analyst Interview Questions
- Top 40 Cyber Security Questions and Answers
- Top 10 React JS Interview Theory Questions and Answers
- CISSP – Practice Test Questions – 2024 – Set 20 (53 Questions)
- Part 2: Exploring Deeper into CCNA – Wireless (145 Practice Test Questions)