CISSP CBK Final Review

Exit

Question 1 of 1

  Time Left


0 [{"id":35635,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:40:07","updated_at":"2016-03-12 19:02:25","questionName":"What type of cryptanalytic attack where an adversary has the least amount of information to work with?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35639,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:43:49","updated_at":"2016-03-12 19:02:25","questionName":"Which of the following characteristics is not of a good stream cipher?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35636,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:41:34","updated_at":"2016-03-12 19:02:25","questionName":"What determines the assignment of data classifications in a mandatory access control (MAC) philosophy?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":36372,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-24 00:51:02","updated_at":"2016-03-12 19:02:25","questionName":"Which key concept is Referential Integrity Constraint associated with?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35638,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:43:03","updated_at":"2016-03-12 19:02:25","questionName":"Which of the following is the primary goal of a security awareness program?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35640,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:44:41","updated_at":"2016-03-12 19:02:25","questionName":"When engaging an external contractor for a software development project, source code escrow can be used to protect against\u2026?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35641,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:45:22","updated_at":"2016-03-12 19:02:25","questionName":"Which of the followings is an example of simple substitution algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35631,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:36:20","updated_at":"2016-03-12 19:02:25","questionName":"A system security engineer is evaluation methods to store user passwords in an information system, so what may be the best method to store user passwords and meeting the confidentiality security objective?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35633,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:38:04","updated_at":"2016-03-12 19:02:25","questionName":"Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35637,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:42:07","updated_at":"2016-03-12 19:02:25","questionName":"A type cryptographic attack where it is based on the probability of two different messages using the same hash function to produce the same message digest is?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35629,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:34:04","updated_at":"2016-03-12 19:02:25","questionName":"As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $1 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10%","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35634,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:38:49","updated_at":"2016-03-12 19:02:25","questionName":"In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by:","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35630,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:35:11","updated_at":"2016-03-12 19:02:25","questionName":"In a typical information security program, what is the primary responsibility of information (data) owner?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":36371,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-24 00:49:19","updated_at":"2016-03-12 19:02:25","questionName":"If a relation refers to a key attribute of a different or same relation, then that key element must exist.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35632,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:36:59","updated_at":"2016-03-12 19:02:25","questionName":"What is the inverse of confidentiality, integrity, and availability (C.I.A.) triad in risk management?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
35635
0
120
block

What type of cryptanalytic attack where an adversary has the least amount of information to work with?

Select the correct answer(s).  

(0/0)












35639
0
120
none
35636
0
120
none
36372
0
120
none
35638
0
120
none
35640
0
120
none
35641
0
120
none
35631
0
120
none
35633
0
120
none
35637
0
120
none
35629
0
120
none
35634
0
120
none
35630
0
120
none
36371
0
120
none
35632
0
120
none