1.
What is the prime directive of Risk Management?
Correct Answer
D. Reduce the risk to a tolerable level
Explanation
The prime directive of Risk Management is to reduce the risk to a tolerable level. This means that the goal is not to eliminate all risks, but rather to bring them down to a level that is acceptable and manageable for the organization. This approach recognizes that it may not be feasible or cost-effective to completely eliminate all risks, so the focus is on minimizing them to a level that can be tolerated and mitigated effectively.
2.
In biometrics, a good measure of performance of a system is the:
Correct Answer
A. Crossover Error Rate (CER).
Explanation
The Crossover Error Rate (CER) is a good measure of performance in biometrics because it represents the point at which the false acceptance rate (FAR) and false rejection rate (FRR) are equal. It indicates the level at which the system can balance the trade-off between incorrectly accepting impostors and incorrectly rejecting genuine users. A lower CER indicates a more accurate and reliable biometric system. False detection, sensitivity, and positive acceptance rate are not specific measures of performance and do not provide the same level of information as the CER.
3.
A distributed system using passwords as the authentication means can use a number of techniques to make the password system stronger. Which of the following is NOT one of these techniques?
Correct Answer
B. Regular password reuse
Explanation
Regular password reuse is not a technique to make the password system stronger. In fact, it weakens the system's security. Reusing passwords across multiple accounts increases the risk of a single compromised password leading to unauthorized access to multiple systems. To strengthen the password system, techniques such as password generators, limiting log-on attempts, and password file protection are used.
4.
The figure shows the configuration of electronic signature used into the public key cryptosystem. Which the appropriate combination of the terms to be put into A and B?
Correct Answer
C. A: Sender's private key
B: Sender's public key
Explanation
The correct combination of terms to be put into A and B is "A: Sender's private key, B: Sender's public key." In a public key cryptosystem, the sender uses their private key to encrypt the message, and the recipient uses the sender's public key to decrypt it.
5.
Authentication in which a random value is presented to a user, who then returns a calculated number based on that random value is called:
Correct Answer
A. Challenge-response
Explanation
Challenge-response authentication involves presenting a random value to a user, who then returns a calculated number based on that random value. This method is used to verify the identity of the user and ensure secure access to a system or network. By generating a unique challenge each time, it becomes difficult for attackers to intercept and replay the response, thus enhancing security.
6.
Which choice below is NOT a common result of a risk analysis?
Correct Answer
B. Definition of business recovery roles
Explanation
A risk analysis typically involves identifying and assessing potential risks and their impact on a business. This process may include evaluating threats, valuing critical assets, and determining the likelihood of potential threats. However, defining business recovery roles is not a common result of a risk analysis. Business recovery roles are typically part of a business continuity plan, which is developed to ensure that essential functions can continue during and after a disruption. While a risk analysis may inform the development of a business continuity plan, it does not directly result in the definition of specific recovery roles.
7.
Which is the inappropriate statement about the use or management of passwords?
Correct Answer
C. Passwords should be displayed on terminals at the point of entry for the purpose of confirmation.
Explanation
Displaying passwords on terminals at the point of entry for the purpose of confirmation is an inappropriate statement about the use or management of passwords. This practice goes against the basic principle of password security, which is to keep passwords confidential. Displaying passwords on terminals would make them visible to anyone who happens to be nearby, increasing the risk of unauthorized access. It is important to keep passwords private and not disclose them in any form, including displaying them on terminals.
8.
The Caesar cipher system is an encryption method in which an alphabetic letter is substituted by a letter located "N" places away. If "abcd" is encrypted with N = 2, we get "cdef". What is the value of N, if we receive the Caesar encrypted "gewl" and decode it as "cash"?
Correct Answer
B. 4
Explanation
The Caesar cipher system is a substitution cipher where each letter in the plaintext is shifted a certain number of places down the alphabet. In this case, the word "gewl" is encrypted with an unknown value of N and decoded as "cash". By comparing the original word "abcd" with the encrypted word "gewl", we can see that each letter is shifted by 2 places. Therefore, the value of N is 2. However, this contradicts the given answer of 4. Hence, the explanation provided is incorrect.
9.
From the view point of security, which is the inappropriate method of operating a computer system using a public switched telephone network?
Correct Answer
D. Display a password on a terminal at the point of entry so that the user will not forget the password
Explanation
Displaying a password on a terminal at the point of entry is inappropriate from a security standpoint. This method compromises the confidentiality of the password as it can be easily viewed by anyone present near the terminal. It increases the risk of unauthorized access to the computer system, as anyone who sees the password can use it to gain unauthorized entry. To ensure security, passwords should be kept confidential and not displayed in a public manner.
10.
A “back door” into a network refers to what?
Correct Answer
A. Mechanisms created by hackers to gain network access at a later time
Explanation
A "back door" into a network refers to mechanisms created by hackers to gain network access at a later time. These mechanisms are typically hidden or disguised within the network's infrastructure, allowing unauthorized access to the network without detection. This can be used by hackers to carry out malicious activities, such as stealing sensitive information or launching further attacks on the network.