1. Which of the following is a term used to describe the hardware, software, and/or firmware that implements cryptographic logic or cryptographic processes?
A) crypto module B) crypto processor C) token D) CSP
2. Your company is determining what data to make accessible in the new cloud-based collaboration solution. Which of the following types of information should not be stored in a public cloud - based collaboration solution?
A) company forms B) financial data C) price lists D) catalogues
3. Your company performs a full backup on Mondays and a differential backup on all other days. You need to restore the datato the state it was in on Thursday. How many backups do you need to restore?
A) one B) three C) two D) four
4. Which of the following is a uniquely identifiable subset of the system that represents the smallest portion to be subject to an independent configuration control procedure?
A) AV B) CU C) CC D) CI
5. Your organization has recently decided to implement encryption on the network. Management requests that you implement a system that uses a private, or secret, key that must remain secret between the two parties. Which system should you implement?
A) running key cipher B) symmetric algorithm C) asymmetric algorithm D) concealment cipher
1. Right Answer: A Explanation: Crypto module is a term used to describe the hardware, software, and/or firmware that implements cryptographic logic or cryptographic processes. Several standards bodies can assess and rate these modules. Among them is the NIST, using the Federal Information Processing Standard (FIPS) Publication 140-2.
2. Right Answer: B Explanation: The following types of information should not be stored in a public cloud based solution: Credit card information Trade secrets Financial data Health records State and federal government secrets Proprietary or sensitive data Personally identifiable information
3. Right Answer: C Explanation: You need to restore two backups: Monday s full backup and Thursday s differential backup.
4. Right Answer: D Explanation: A configuration item (CI) is a uniquely identifiable subset of the system that represents the smallest portion to be subject to an independent configuration control procedure. When an operation is broken into individual CIs, the process is called configuration identification.
5. Right Answer: B Explanation: A symmetric algorithm uses a private, or secret, key that must remain secret between the two parties. A running key cipher uses a physical component, usually a book, to provide the polyalphabetic characters. A concealment cipher occurs when plaintext is interspersed somewhere within other written material. An asymmetric algorithm uses both a public key and a private, or secret, key.
Leave a comment