Week 2 Quiz SSCP

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Matthew Bondoc

CYSEC 4305
Charles Lecke
09/07/2014
Week 2 Quiz
1) What are the three main goals of any information security program?
A) Preventing losses in accounting, integrity, and confidentiality
B) Preventing losses in availability, identification, and confidentiality
C) Preventing losses in availability, integrity, and due care
D) Preventing losses in availability, integrity, and confidentiality

2) If an individual is involved in an ethical dilemma where there is a conflict between the (ISC)2
canons, how should the conflict be resolved?
A) It is not possible to have conflict between the canons
B) The preamble should take precedence
C) The (ISC)2 peer review panel should be queried
D) Conflicts between the canons should be resolved in the order of the canons

3) What must occur before a system can implement access controls?
A) Identification and authentication
B) Identification and accountability
C) Authentication and accounting
D) Accountability and availability

4) Which of the following is not used SSO?
A) Kerberos
B) Decentralized authentication
C) KryptoKnight
D) SESAME

5) When is it acceptable for a user to give out a password to another person?
A) Never
B) Only when asked to by the users banking facility
C) Only when asked to by the users Internet service provider (ISP)
D) Only when asked to by a fellow worker whom they trust

6) Which of the following protocols is connection-oriented?
A) IP
B) RIP
C) TCP
D) UDP

7) What is the well-known port for HTTPS?
A) 80
B) 88
C) 443
D) 1701
8) Which of the following protocols does not encrypt the traffic?
A) SSH
B) FTP
C) IPsec
D) SSL

You might also like