Question.31 Which of the following encryption technologies has the ability to function as a stream cipher? (A) Cipher Block Chaining (CBC) with error propagation (B) Electronic Code Book (ECB) (C) Cipher Feedback (CFB) (D) Feistel cipher |
31. Click here to View Answer
Correct Answer: C
Question.32 In a disaster recovery (DR) test, which of the following would be a trait of crisis management? (A) Process (B) Anticipate (C) Strategic (D) Wide focus |
32. Click here to View Answer
Correct Answer: B
Question.33 Which of the following BEST describes the purpose of the reference monitor when defining access control to enforce the security model? (A) Strong operational security to keep unit members safe (B) Policies to validate organization rules (C) Cyber hygiene to ensure organizations can keep systems healthy (D) Quality design principles to ensure quality by design |
33. Click here to View Answer
Correct Answer: B
Question.34 Which of the following is security control volatility? (A) A reference to the impact of the security control. (B) A reference to the likelihood of change in the security control. (C) A reference to how unpredictable the security control is. (D) A reference to the stability of the security control. |
34. Click here to View Answer
Correct Answer: B
Question.35 When auditing the Software Development Life Cycle (SDLC) which of the following is one of the high-level audit phases? (A) Planning (B) Risk assessment (C) Due diligence (D) Requirements |
35. Click here to View Answer
Correct Answer: A