1. Which attribute constitutes the ability to identify Accountability
and/or audit a user and his/her actions?
2. Which security standards commonly supplements the IPSEC
use of an Internet Key Exchange (IKE)?
3. Which detail concerning risk analysis would you pre- Quantitative
sent to leadership regarding quantitative analysis ? analysis uses the
ALE formula, and
uses numeric
values.
4. Which logical topology usually has a physical star Bus
topology
5. The three main control categories within the risk man- Prevent, Detect,
agement framework are which of the following? Limit
6. If your organization wants the most efficient re- Full
store from backup, which type of backup would you
choose?
7. What type of encrypted string is the output of a one Fixed length
way hash function on a string of random length?
8. Which technology includes the X.500 protocol? LDAP
9. Accountability for the timely distribution of informa- All of the organiza-
tion security intelligence data is assumed by which tions listed
organization(s)?
10. Working as a network administrator for your organiza- All non DNS
tion, which of the following choices should have the servers
BIND application disabled?
11. Which form of cryptography includes AES, Blowfish, Secret Key
DES, and 3DES?
12. DNS
1/2