CISSP-3-3

CISSP-3-3

Assessment

Quiz

Mathematics

1st - 5th Grade

Practice Problem

Medium

Created by

dd disuza

Used 1+ times

FREE Resource

Student preview

quiz-placeholder

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. (3.5.15) What is VM sprawl?

A. A large collection of virtualized environments

B. A situation where an administrator loses control of VM machines on a network

C. A virtualized infrastructure

D. Cold VM

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When comparing the NIST and ISO cloud characteristics, the ISO/IEC 17788 adds an additional essential cloud characteristic that NIST does not list. Which one of these does ISO include?

A. Measured service

B. Pooling

C. Network access

D. Multi-tenancy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement about embedded systems best describes their security risks?

A. Because they use industry-standard processors, software, and communications systems, they are usually low risk.

B. Their use of proprietary technologies and designs makes them higher risk

. C. They have low physical security risks. .

D. Their use of proprietary technologies and designs makes it harder for attackers to discover and exploit their vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cloud computing has many advantages but can introduce latency; to reduce this, edge and fog computing architectures can be used. Which statement best describes the difference between edge and fog computing architectures?

A. Fog computing occurs directly onto the sensor-attached devices.

B. Edge computing occurs directly onto the sensor-attached devices.

C. Edge computing decouples hardware and applications.

D. Essentially, they are the same.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true?

A. Encryption converts plaintext to ciphertext using a commonly (publicly) known system and requires a key.

B. Encoding converts plaintext to another commonly (publicly) known format.

C. Enciphering converts plaintext to ciphertext using a commonly (publicly) known system and requires a key

. D. Steganography converts plaintext to ciphertext using a commonly (publicly) known system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a symmetric key system where an organization has 20,000 users, how many keys need to be generated?

A. 20,000

B. 40,000

C. 200,000

D. 199,990,000

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetrical encryption has the highest strength per bit of key length?

A. Diffie-Hellman-Merkle

B. ElGamal

C. ECC (Elliptical Curve Cryptography)

D. RSA (Rivest-Shamir-Adleman)

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The X.509 v3 standard introduced support for extensions. What benefit do extensions provide?

A. A way to identify the public key owner

B. A way to include the X.500 name

C. A way to allow user defined extensions for certificates

D. A way to provide a unique identifier

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following cryptanalytic attacks is considered the most successful in practice?

A. Social engineering

B. Side-channel attacks

C. Linear cryptanalysis

D. Chosen ciphertext attack