Page 359 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 359

D.  Remanence

              10.  Which one of the following is based on Blowfish and helps protect
                    against rainbow table attacks?


                    A.  3DES

                    B.  AES

                    C.  Bcrypt

                    D.  SCP

               11.  Which one of the following would administrators use to connect to
                    a remote server securely for administration?

                    A.  Telnet

                    B.  Secure File Transfer Protocol (SFTP)

                    C.  Secure Copy (SCP)

                    D.  Secure Shell (SSH)


               12.  Which one of the following tasks would a custodian most likely
                    perform?

                    A.  Access the data

                    B.  Classify the data

                    C.  Assign permissions to the data

                    D.  Back up data

               13.  Which one of the following data roles is most likely to assign
                    permissions to grant users access to data?

                    A.  Administrator


                    B.  Custodian

                    C.  Owner

                    D.  User

               14.  Which of the following best defines “rules of behavior” established
                    by a data owner?

                    A.  Ensuring that users are granted access to only what they need
   354   355   356   357   358   359   360   361   362   363   364