CIS 502 Final Exam Solution

$75.00

CIS 502 Final Exam Solution

 

 

Latest  A+ Graded Check Questions Below

Description

CIS 502 Final Exam Solution

 

Chapter 5:  Cryptography

 

MULTIPLE CHOICE

 

  1. The process of transforming cipher text to plaintext is known as:
a. Decryption c. Key recovery
b. Encryption d. Hashing 

 

  1. Which of the following statements is true about the Vernam cipher:
a. It is a polyalphabetic cipher
b. It is a running-key cipher
c. The encryption key is used for only one message
d. Another name for it is a one-time hash

 

More questions hidden………..

 

Chapter 6:  Legal, Regulations, Compliance and Investigations

 

MULTIPLE CHOICE

 

  1. The categories of laws in the U.S. are:
a. Civil, criminal, administrative, and family c. Criminal, civil, and administrative
b. Intellectual, privacy, and computer crime d. Criminal, civil, and family

 

 

  1. Trademarks, copyrights, and patents are all a part of:
a. Intellectual property law c. Administrative law
b. Civil law d. Private property law

 

More questions hidden………..

 

 

Chapter 7: Operations Security

 

MULTIPLE CHOICE

 

  1. An employee in an organization is requesting access to more information than is required. This request should be denied on the basis of which principle:
a. Separation of duties c. Need to know
b. Least privilege d. Job rotation 

 

 

  1. Two separate employees are required to open a safe containing sensitive information. One employee has part of the safe combination, and a second employee has another part of the safe combination. This arrangement follows the principle of:
a. Split custody c. Need to know
b. Segregation of duties d. Least privilege

 

 

Chapter 8:  Physical and Environmental Security

 

MULTIPLE CHOICE

 

  1. The use of key cards to control physical access to a work facility is a form of:
a. Both preventive and administrative control
b. Detective control
c. Both preventive and detective control
d. Preventive control

 

 

  1. A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility. What measure can be used to prevent this?
a. Implement PIN pads at card reader stations
b. Implement video surveillance at card reader stations
c. Implement man traps at card reader stations
d. Implement RFID sensors at card reader stations

 

 

Chapter 9:  Security Architecture and Design

 

MULTIPLE CHOICE

 

  1. The owners of files and directories on a file server are able to control which personnel may access those files and directories. The access control model that most closely resembles this is:
a. Role based access control (RBAC) c. Discretionary access control (DAC)
b. Mandatory access control (MAC) d. Multilevel access

 

 

  1. A resource server contains an access control system. When a user requests access to an object, the system examines the permission settings for the object and the permission settings for the user, and then makes a decision whether the user may access the object. The access control model that most closely resembles this is:
a. Mandatory access control (MAC) c. Non-interference
b. Discretionary access control (DAC) d. Role based access control (RBAC)

 

 

Chapter 10:  Telecommunications and Network Security

 

MULTIPLE CHOICE

 

  1. A network engineer who is examining telecommunications circuits has found one that is labeled as a DS-1. What is the maximum throughput that may be expected from this circuit?

 

  1. The size of packets in an ATM networks is:
a. 53 bytes c. 1544 bytes
b. 1500 bytes d. Variable, from 64 to 1500 bytes