Which data source comes first in the order of volatility when conducting a forensic
investigation?
a)Random access memory (RAM)
b)Files on disk
c)Swap and paging files
d)Logs
During which step of the incident-handling process should a lessons-learned review of
the incident be conducted?
a)Response
b)Notification
c)Documentation
d)Recovery and follow-up
During which step of the incident-handling process does triage take place?
a)Notification
b)Response
c)Recovery and follow-up
d)Identification
Joe is responsible for the security of the systems that control and monitor devices for a
power plant. What type of system does Joe likely administer?
a)Mobile fleet
b)Mainframe
c)Embedded robotic systems
d)Supervisory Control and Data Acquisition (SCADA)
Business continuity management includes business continuity planning, disaster
recovery planning, crisis management, incident response management, and risk
management.
True
False
What is the purpose of a disaster recovery plan (DRP)?
a)To set the value of each business process or resource as it relates to how the entire
,organization operates
b)To set the order or priority for restoring an organization's functions after a disruption
c)To identify the critical needs to develop a business recovery plan
d)To enable an organization to make critical decisions ahead of time so personnel can
manage and review decisions without the urgency of an actual disaster
Which method of fault tolerance connects two or more computers to act like a single
computer in a highly coordinated manner?
a)Load balancing
b)Redundant Array of Inexpensive Disks (RAID)
c)Outsourcing to the cloud
d)Clustering
Which of the following is not true of data backup options?
a)An incremental backup starts with a full backup; successive backups back up only
that day's changes.
b)Backup; successive backups back up changes made since the last full backup.
c)It is faster to create differential weekday backups than incremental backups.
d)A full backup copies everything to backup media.
Susan performs a full backup of her server every Sunday at 1:00 a.m. and differential
backups on Mondays through Fridays at 1:00 a.m. Her server fails at 9:00 a.m. on
Wednesday. How many backups does Susan need to restore?
a)4
b)1
c)2
d)3
A business impact analysis (BIA) details the steps to recover from a disruption and
restore the infrastructure necessary for normal business operations.
True
False
Which approach to cryptography uses highly parallel algorithms that could solve
problems in a fraction of the time needed by conventional computers?
Quantum cryptography
Asymmetric cryptography
Elliptic curve cryptography
Classic cryptography
When Alice receives a message from Bob, she wants to be able to demonstrate to
Miriam that the message actually came from Bob. What goal of cryptography is Alice
, attempting to achieve?
Confidentiality
Integrity
Authentication
Nonrepudiation
Bob received a message from Alice that contains a digital signature. What cryptographic
key does Bob use to verify the digital signature?
Alice's private key
Alice's public key
Bob's public key
Bob's private key
True or False? An algorithm is a repeatable process that produces the same result
when it receives the same input.
True
Alice and Bob would like to communicate with each other using a session key, but they
do not already have a shared secret key. Which algorithm can they use to exchange a
secret key?
Blowfish
Message digest algorithm (MD5)
Rivest-Shamir-Adelman (RSA)
Diffie-Hellman
What is the only unbreakable cipher when it is used properly?
Vernam
Blowfish
Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)
Rivest-Shamir-Adelman (RSA)
True or False? You must always use the same algorithm to encrypt information and
decrypt the same information.
False
Alice would like to send a message to Bob using a digital signature. What cryptographic
key does Alice use to create the digital signature?
Bob's private key
Alice's private key
Bob's public key
Alice's public key