CISSP CBK Final Review

Exit

Question 1 of 1

  Time Left


0 [{"id":35641,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:45:22","updated_at":"2016-03-12 19:02:25","questionName":"Which of the followings is an example of simple substitution algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35631,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:36:20","updated_at":"2016-03-12 19:02:25","questionName":"A system security engineer is evaluation methods to store user passwords in an information system, so what may be the best method to store user passwords and meeting the confidentiality security objective?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":36372,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-24 00:51:02","updated_at":"2016-03-12 19:02:25","questionName":"Which key concept is Referential Integrity Constraint associated with?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35635,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:40:07","updated_at":"2016-03-12 19:02:25","questionName":"What type of cryptanalytic attack where an adversary has the least amount of information to work with?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35633,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:38:04","updated_at":"2016-03-12 19:02:25","questionName":"Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35634,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:38:49","updated_at":"2016-03-12 19:02:25","questionName":"In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by:","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35630,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:35:11","updated_at":"2016-03-12 19:02:25","questionName":"In a typical information security program, what is the primary responsibility of information (data) owner?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35639,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:43:49","updated_at":"2016-03-12 19:02:25","questionName":"Which of the following characteristics is not of a good stream cipher?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35632,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:36:59","updated_at":"2016-03-12 19:02:25","questionName":"What is the inverse of confidentiality, integrity, and availability (C.I.A.) triad in risk management?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":36371,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-24 00:49:19","updated_at":"2016-03-12 19:02:25","questionName":"If a relation refers to a key attribute of a different or same relation, then that key element must exist.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35638,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:43:03","updated_at":"2016-03-12 19:02:25","questionName":"Which of the following is the primary goal of a security awareness program?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35636,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:41:34","updated_at":"2016-03-12 19:02:25","questionName":"What determines the assignment of data classifications in a mandatory access control (MAC) philosophy?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35629,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:34:04","updated_at":"2016-03-12 19:02:25","questionName":"As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $1 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10%","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35637,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:42:07","updated_at":"2016-03-12 19:02:25","questionName":"A type cryptographic attack where it is based on the probability of two different messages using the same hash function to produce the same message digest is?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35640,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:44:41","updated_at":"2016-03-12 19:02:25","questionName":"When engaging an external contractor for a software development project, source code escrow can be used to protect against\u2026?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
35641
0
120
block

Which of the followings is an example of simple substitution algorithm?

Select the Correct Answers  

(0/0)












35631
0
120
none
36372
0
120
none
35635
0
120
none
35633
0
120
none
35634
0
120
none
35630
0
120
none
35639
0
120
none
35632
0
120
none
36371
0
120
none
35638
0
120
none
35636
0
120
none
35629
0
120
none
35637
0
120
none
35640
0
120
none