• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
Which of the following suppresses combustion by disrupting a chemical reaction, by doing so it kills the fire?
Halon
Which of the following is based on the premise that the quality of a software product is a direct function of the quality of its associated software development and maintenance processes?
The Software Capability Maturity Model (CMM)
Which one of the following is a key agreement protocol used to enable two entities to agree and generate a session key (secret key used for one session) over an insecure medium without any prior secrets or communications between the entities? The negotiated key will subsequently be used for message encryption using Symmetric Cryptography.
Diffie_Hellmann
What is the role of IKE within the IPsec protocol?
peer authentication and key exchange
What kind of encryption is realized in the S/MIME-standard?
Public key based, hybrid encryption scheme
Which of the following can best define the "revocation request grace period"?
Time period between the arrival of a revocation request and the publication of the revocation information
Which one of the following is NOT one of the outcomes of a vulnerability analysis?
Formal approval of BCP scope and initiation document
A database view is the results of which of the following operations?
Join, Project, and Select.
In which layer of the OSI Model are connection-oriented protocols in the TCP/IP suite implemented?
›Transport layer
External consistency ensures that the data stored in the database is:
consistent with the real world.
Like the Kerberos protocol, SESAME is also subject to which of the following?
password guessing
Which one of the following statements about the advantages and disadvantages of network-based Intrusion detection systems is true
The deployment of network-based IDSs has little impact upon an existing network.
Which of the following BEST explains why computerized information systems frequently fail to meet the needs of users?
Inadequate user participation in defining the system's requirements.
Which of the following tape formats can be used to backup data systems in addition to its original intended audio uses?
Digital Audio Tape (DAT).
Which of the following provides the ability to reconstruct the contents of a failed disk onto a replacement disk?
Failure Resistant Disk System
Which of the following would be the best reason for separating the test and development environments?
To control the stability of the test environment.
The Diffie-Hellman algorithm is primarily used to provide which of the following?
Key Agreement
What is the RESULT of a hash algorithm being applied to a message ?
A message digest
Which of the following statements relating to the Bell-LaPadula security model is FALSE (assuming the Strong Star property is not being used) ?
A subject is not allowed to read down.