Hello all,
Here are few questions, I marked answers but I could not confirm accuracy on their answers. kindly support.
Which of the following ensures that the application’s hardware remain highly available?
a. Disk Mirroring
b. Clustering
c. RAI
d. RAIT
answer A
2. What is the advantage of digital signatures over message authentication codes?
a. Digital signature provides integrity verification while message authentication code can not
b. Digital signature provides confidentiality while message authentication code can not
c. Digital signature provides authenticity while message authentication code can not
d. Digital signature works faster than message authentication codes
Answer C
3. What is not secured in end-to-end encryption?
a. Packet payload
b. Public key
c. Packet header
d. Private key
Answer C
4. When due diligence and due care is observed it is said to be:
a. Prudent person rule
b. Proactive approach
c. Negligence
d. Reactive approach
Answer A
5. Which of the following algorithms can be used for Kerberos encryption
a. DSA
b. RSA
c. DES
d. ECC
Answer B
6. Which of the following provide isolation between subjects and objects?
a. Reference monitor kernel
b. Security monitor kernel
c. Trusted computing base
d. Security kernel
Answer:??
7. What is the purpose of using Secure Hash Algorithm in virtual private networks?
a. Authentication
b. Key validation
c. Integrity
d. Encryption
Answer??
8. Which of the following documents has optional statements?
a. Policy
b. Regulation
c. Baseline
d. Guideline
Answer: d
9. Which of the following glass type you will use for windows opening at street level
a. Tempered glass
b. Wired glass
c. Laminated glass
d. Bullet resistant glass
Answer: C
10. If an IDS runs a script on firewall to block an attacking address, what type of control it is?
a. Corrective
b. Preventive
c. Detective
d. Compensating
Answer: A
Right.
@savita1974 wrote:Here are few questions, I marked answers but I could not confirm accuracy on their answers. kindly support.
Support? No way am I going to support most of these questions. Most of them are badly written.
Go look at some decent questions.
Which of the following ensures that the application’s hardware remain highly available?
a. Disk Mirroring
b. Clustering
c. RAI
d. RAIT
answer A
Without being more specific about "available," either a, b, or d could be correct. Of them, I would say, based on the (sloppy) wording of the question, that b would be the best answer.
2. What is the advantage of digital signatures over message authentication codes?
a. Digital signature provides integrity verification while message authentication code can not
b. Digital signature provides confidentiality while message authentication code can not
c. Digital signature provides authenticity while message authentication code can not
d. Digital signature works faster than message authentication codes
Answer C
OK, b and d are wrong, so we can throw them out. But, again, the question is badly written, and doesn't give you much to choose between a and c. Except that c, if you don't get more specific about what type of "authenticity" you want, is also wrong. MAC can provide authenticity; it's just weaker than a digital signature (if the signature is done properly).
3. What is not secured in end-to-end encryption?
a. Packet payload
b. Public key
c. Packet header
d. Private key
Answer C
OK, c is the correct answer.
Where did you find these questions? They're really bad. I'm not wasting any more time on them ...
Also what did you hope to find out by making this post? Did you disagree with the answers so you want help in understanding why you got them wrong (a most helpful study tactic)? Did you wonder if they were poorly worded (as @rslade so correctly pointed out)? Were the answers provided your answers (and you were wanting to know if you were correct) or were they the quiz provider's answers (and you wanted to know if they were correct)?
I guess I'm just a little confused on how we are to help you without a little more info?
The questions are not as well written as they could be:
Q1. Nothing ensures availability. Measures are likely to simply increase availability if properly designed/implemented. If incorrectly implemented they can decrease availability.
Hi Steve,
These posted questions answers are not provided by quiz owner. Based on my understanding, I marked answers. I posted as wanted to validate their correctness.
Thanks
Savita
@savita1974 Where are you getting these questions from? Not sure who or what koenig refers to.
They are very poorly written and if you are studying for either the SSCP or CISSP or any (ISC)2 exam, I do not believe they are representative.
d
@dcontesti wrote:@savita1974 Where are you getting these questions from? Not sure who or what koenig refers to.
They are very poorly written and if you are studying for either the SSCP or CISSP or any (ISC)2 exam, I do not believe they are representative.
d
I believe it's the organization 'Koenig Solutions,' which provides IT training. (Not that I believe the questions are well written.)