Information Assurance Exam Practice Tests - 1198 Verified Questions

Page 1


Information Assurance Exam Practice Tests

Course Introduction

Information Assurance focuses on the principles and practices essential for protecting information assets and managing risks related to information systems. The course covers foundational concepts such as confidentiality, integrity, availability, authentication, and non-repudiation, along with risk assessment, security policies, incident response, and security management frameworks. Students will learn methods for identifying threats and vulnerabilities, implementing controls, and ensuring compliance with legal, ethical, and regulatory requirements, preparing them to develop and manage comprehensive information assurance strategies in a variety of organizational contexts.

Recommended Textbook

Corporate Computer Security 4th Edition by Randy

Available Study Resources on Quizplus

11 Chapters

1198 Verified Questions

1198 Flashcards

Source URL: https://quizplus.com/study-set/1400

Page 2

Chapter 1: The Threat Environment

Available Study Resources on Quizplus for this Chatper

103 Verified Questions

103 Flashcards

Source URL: https://quizplus.com/quiz/27878

Sample Questions

Q1) A program that gives the attacker remote access control of your computer is specifically called a ________.

A) Trojan horse

B) spyware program

C) cookie

D) RAT

Answer: D

Q2) The three common core goals of security are ________.

A) confidentiality, integrity, and availability

B) confidentiality, information, and availability

C) confidentiality, integrity, and authentication

D) confidentiality, information, and authorization

Answer: A

Q3) Downloading pornography can lead to sexual harassment lawsuits.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Planning and Policy

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/27880

Sample Questions

Q1) ________ examines financial processes for efficiency, effectiveness, and adequate controls.

A) Internal auditing

B) Financial auditing

C) IT auditing

D) None of the above

Answer: B

Q2) Which of the following specifies how to do certification by external parties?

A) COSO

B) CobiT

C) ISO/IEC 27000

D) All of the above have certification by external parties.

Answer: C

Q3) This book focuses on ________.

A) offense

B) defense

C) offense and defense about equally

D) None of the above

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Cryptography

Available Study Resources on Quizplus for this Chatper

122 Verified Questions

122 Flashcards

Source URL: https://quizplus.com/quiz/27881

Sample Questions

Q1) A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages.

A) key

B) cipher

C) plaintext

D) code

Answer: A

Q2) In public key encryption for authentication, the supplicant must prove that it knows ________, which nobody else should be able to know.

A) the supplicant's public key

B) the supplicant's private key

C) the true party's private key

D) the verifier's private key

Answer: C

Q3) Which of the following can be used as a keying method?

A) Public key encryption for confidentiality

B) MS-CHAP

C) Both A and B

D) None of the above

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Secure Networks

Available Study Resources on Quizplus for this Chatper

119 Verified Questions

119 Flashcards

Source URL: https://quizplus.com/quiz/27882

Sample Questions

Q1) A ________ can be used to gather network information or user data.

A) RFMON

B) packet sniffer

C) whaling device

D) None of the above

Q2) WLAN DoS attacks are designed to affect the ________ of the network.

A) confidentiality

B) integrity

C) availability

D) authentication

Q3) Using a shared initial key is dangerous in ________.

A) WEP

B) WPA pre-shared key mode

C) Both A and B

D) Neither A nor B

Q4) Most DoS attacks are difficult to detect.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Access Control

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/27883

Sample Questions

Q1) Compared to access control based on individual accounts, RBAC is ________.

A) less prone to error

B) more expensive

C) Both A and B

D) Neither A nor B

Q2) XML makes SAML platform-dependent.

A)True

B)False

Q3) On loading docks, outgoing shipments should be separated from incoming shipments ________.

A) to ensure the segregation of duties

B) to avoid confusion

C) to reduce the risk of theft

D) All of the above

Q4) In ________ the department has discretion over giving access to individuals, within policy standards set by higher authorities.

A) policy-based access control

B) mandatory access control

C) discretionary access control

D) delegated access control

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Firewalls

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27884

Sample Questions

Q1) A ________ attack is an attack that is made before attack signatures for the threat are defined.

A) zero-day

B) vulnerability based

C) stealth

D) anomaly based

Q2) In ________ filtering, the firewall examines packets entering the network from the outside.

A) ingress

B) egress

C) Both A and B

D) Neither A nor B

Q3) Which of the following is one of the two simple DEFAULT SPI firewall rules for packets that attempt to open connections?

A) Permit all attempts to open a connection from an internal host to an external host

B) Permit all attempts from external hosts to open a connection with an internal host

C) Both A and B

D) Neither A nor B

To view all questions and flashcards with answers, click on the resource link above.

8

Chapter 7: Host Hardening

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27885

Sample Questions

Q1) To get to the super user account in Windows, the administrator can use the ________ command.

A) RunAs

B) su

C) rlogin

D) None of the above

Q2) Different UNIX versions have different security methods.

A)True

B)False

Q3) Stealing the password file from a computer is safer than attempting to log in remotely.

A)True

B)False

Q4) Microsoft's server operating system is called ________.

A) UNIX

B) Windows Server

C) Both A and B

D) Neither A nor B

To view all questions and flashcards with answers, click on the resource link above.

Page 9

Chapter 8: Application Security

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27886

Sample Questions

Q1) Testers have permissions on the ________.

A) development server

B) testing server

C) production server

D) Both A and B

Q2) ________ offers no security at all.

A) SNMP V1

B) SNMP V2

C) SNMP V3

D) All of the above offer security.

Q3) Compared to full programming languages, scripts are ________ in what they can do.

A) more limited

B) less limited

C) about as limited (but easier to use)

D) not limited at all

Q4) The first task in security is to understand the environment to be protected.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Data Protection

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/27887

Sample Questions

Q1) Data can be lost by ________.

A) mechanical failure

B) environmental casualties

C) malware

D) All of the above

Q2) With local backup processes, policies are easily enforced.

A)True

B)False

Q3) Typically, the shadow storage space is nearly unlimited.

A)True

B)False

Q4) Technology is the most effective method of avoiding problems during the legal discovery process.

A)True

B)False

Q5) Magnetic tape is ________.

A) expensive to use

B) very fast

C) Both A and B

D) Neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Incident and Disaster Response

Available Study Resources on Quizplus for this Chatper

107 Verified Questions

107 Flashcards

Source URL: https://quizplus.com/quiz/27879

Sample Questions

Q1) The normal standard for deciding a case in ________ trials is a preponderance of the evidence.

A) civil

B) criminal

C) Both A and B

D) Neither A nor B

Q2) Which of the following is not one of the four security levels of incidents?

A) False alarms

B) Minor incidents

C) Virus epidemics

D) Disasters

Q3) Past judicial precedents constitute ________.

A) case law

B) statutes

C) criminal law

D) All of the above

Q4) If a defendant has already been prosecuted in a criminal trial, he or she cannot later be tried in a civil trial.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Module A: Networking Concepts

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/27888

Sample Questions

Q1) TCP/IP's internet layer supervisory protocol is ________.

A) DNS

B) DHCP

C) ICMP

D) All of the above.

Q2) A ________ is likely to have the same address each time it goes on the Internet.

A) client

B) server

C) Both A and B

D) Neither A nor B

Q3) A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The receiving host is a(n) ________.

A) client

B) TCP server

C) webserver

D) e-mail server

Q4) Spread spectrum transmission in wireless LANs provides security.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 13

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook