1. What is an effective countermeasure for the vulnerability of data entry operators potentially leaving their computers without logging off?
A) Employee security awareness training B) Administrator alerts C) Screensaver passwords D) Close supervision
2. What can ISPs use to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources?
A) OSI Layer 2 switches with packet filtering enabled B) Virtual Private Networks C) Access Control Lists (ACL) D) Point-to-Point Tunneling Protocol
3. What is the key distinction between encryption and hashing algorithms?
A) Hashing algorithms ensure data confidentiality. B) Hashing algorithms are irreversible. C) Encryption algorithms ensure data integrity. D) Encryption algorithms are not irreversible.
4. Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?
A) Data diddling B) Skimming C) Data corruption D) Salami attack
5. Which of the following is used to evaluate biometric access controls?
A) FAR B) EER C) ERR D) FRR
1. Right Answer: C Explanation: Screensaver passwords are an effective control to implement as a countermeasure for the vulnerability of data entry operators potentially leaving their computers without logging off.
2. Right Answer: C Explanation: ISPs can use access control lists to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources.
3. Right Answer: B Explanation: A key distinction between encryption and hashing algorithms is that hashing algorithms are irreversible.
4. Right Answer: A Explanation: Data diddling involves modifying data before or during systems data entry.
5. Right Answer: B Explanation: When evaluating biometric access controls, a low equal error rate (EER) is preferred. EER is also called the crossover error rate (CER).
Leave a comment