ANSWERS
Which of the following issues is NOT addressed by Kerberos?
A.
Availability
B.
Confidentiality
C.
Integrity
D.
Authentication Accurate Answer - A
NO: 2
Which of the following statements is not listed within the 4 canons of the
(ISC)2 Code of Ethics?
A.
All information systems security professionals who are certified by (ISC)2
shall observe all
contracts and agreements, express or implied.
B.
All information systems security professionals who are certified by (ISC)2
shall render only those
services for which they are fully competent and qualified.
,C.
All information systems security professionals who are certified by (ISC)2
shall promote and
preserve public trust and confidence in information and systems.
D.
All information systems security professionals who are certified by (ISC)2
shall think about the
social consequences of the program they write. Accurate Answer - D
NO: 3
Regarding codes of ethics covered within the ISC2 CBK, within which of them
is the phrase
"Discourage unsafe practice" found?
A.
Computer Ethics Institute commandments
B.
(ISC)2 Code of Ethics
C.
Internet Activities Board's Ethics and the Internet (RFC1087)
D.
CIAC Guidelines Accurate Answer - B
NO: 5
,Which of the following is the correct set of assurance requirements for EAL 5?
A.
Semiformally verified design and tested
B.
Semiformally tested and checked
C.
Semiformally designed and tested
D.
Semiformally verified tested and checked Accurate Answer - C
NO: 4
Which of the following is NOT a factor related to Access Control?
A.
integrity
B.
authenticity
C.
confidentiality
D.
availability Accurate Answer - B
NO: 6
, Which of the following is needed for System Accountability?
A.
Audit mechanisms.
B.
Documented design as laid out in the Common Criteria.
C.
Authorization.
D.
Formal verification of system design. Accurate Answer - A
NO: 7
The major objective of system configuration management is which of the
following?
A.
System maintenance.
B.
System stability.
C.
System operations.
D.
System tracking. Accurate Answer - B
NO: 8