CSCI 501 Final

CSCI 501 Final Liberty University

  1. Which of the following is not a type of monitoring device?
  2. Which of the following is considered a threat rather than a risk?
  3. Which of the following is an asymmetric encryption algorithm?
  4. Which of the following serves as an authentication server (AS) and a ticket- granting server (TGS)?
  5. Which of the following is not a privacy principle of the Organization for Economic Cooperation and Development (OECD)?
  6. When defining an audit plan for IT security, what is the first step that must be done?
  7. “Which one of the following measures the average amount of time that it takes to repair a system, application, or component?”
  8. Which of the following is not a method for maintaining the security of a substitution cipher?
  9. What does GIAC stand for?
  10. Which of the following is a vendor-specific certification?
  11. Which of the following helps keep critical business processes running during a disaster?
  12. Identify the OSI reference model layer that handles end-to-end communication maintenance.
  13. Which type of virus targets computer hardware and software startup functions?
  14. Beth must purchase firewalls for several network circuits used by her organization. Which one circuit will have the highest possible network throughput?
  15. Your company is planning to produce a new consumer electronics device. Which of the following is the best source of information to ensure your device meets safety and performance standards?
  16. Juan’s web server was down for an entire day last September. It experienced no other downtime during that month. Which one of the following represents the web server uptime for that month?
  17. Regarding access control policy management, which of the following is not considered a central element of access?
  18. Which of the following is usually associated with a phishing Web site?
  19. Which of the following is not a primary type of authentication?
  20. Which organization’s certifications focus on a Common Body of Knowledge (CBK)?
  21. Which of the following seeks to eliminate human latency in the decision-making process?
  22. Under GLBA, what is nonpublic personal information (NPI)?
  23. Which of the following is a type of authentication?
  24. Which type of attack involves capturing data packets from a network and retransmitting them to produce an unauthorized effect?
  25. Session Initiation Protocol (SIP) supports which of the following?
  26. Which law does not require securing private information, but it does require security controls to protect the confidentiality and integrity of the reporting itself?
  27. What is a common reason for not completely eliminating a risk?
  28. Entities that receive federal funding from the E-Rate program must abide by which law?
  29. When conducting a business impact analysis on critical business functions, the amount of data loss that is acceptable is called .
  30. Which of the following is generally not an objective of cryptanalysis?
  31. Which of the following is not true of security certifications?
  32. The key to protecting assets from the risk of attack is to eliminate or address as many as possible.
  33. What is typically the first step in a risk management process?
  34. Which of the following is an action that could damage an asset?
  35. What is a characteristic of analog communications?
  36. Which of the following is a TCP/IP protocol that provides a computer with an IP address, subnet mask, and other essential communication information?
  37. What is a potential drawback to using a smart card as a method of authentication?
  38. Which of the following is typically not a drawback to VoIP and SIP applications?
  39. Schools and libraries that must conform to CIPA requirements must implement a technology protection measure (TPM). What does TPM do?
  40. Which of the following uses mathematical formulas and numbers to rank risk
  41. Which of the following is not a type of penetration test?
  42. Two users must pass short, quick messages to one another during conference calls. Which of the following unified communications components is best suited for this task?
  43. “Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a protocol that uses secure, encrypted connections?”
  44. Which domain of a typical IT infrastructure includes cabling, servers, and wireless access points?
  45. Which of the following laws requires high-level officers to personally verify and attest to the accuracy of financial data?
  46. Regarding a disaster recovery plan, which of the following is the least expensive to set up?
  47. Wen creating a business impact analysis (BIA), it is your job as a security
  48. Organizations that require customer-service representatives to access private customer data can best protect customer privacy and make it easy to access other consumer data by using what two security tools?
  49. The is active in developing standards that support safety, performance, environmental responsibility, energy efficiency, and renewable energy sources.
  1. What (ISC)2 certification specifically addresses developing secure software?
$3.99
Buy Answer Key

has been added to your cart!

have been added to your cart!

Files Included - Liberty University
  1. CSCI 501 Final