100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
FITSP - AUDITOR QUESTIONS AND ANSWERS 2024 $17.99   Add to cart

Exam (elaborations)

FITSP - AUDITOR QUESTIONS AND ANSWERS 2024

 2 views  0 purchase
  • Course
  • FITSP - AUDITOR
  • Institution
  • FITSP - AUDITOR

FITSP - AUDITOR QUESTIONS AND ANSWERS 2024

Preview 4 out of 75  pages

  • October 27, 2024
  • 75
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • FITSP - AUDITOR
  • FITSP - AUDITOR
avatar-seller
Teacher101
FITSP - AUDITOR

What lPSec protocol can be configured to provide compression for lPSec traffic?

a) AH

b) ESP

c) lPComp

d) rKE - ANSWERS-lPComp



Which of the following two protocols are actually different names for the same
protocol?

a) ssL 3.0

b) TLS 1.1

c) SSL 3.1

d) TLS 1.0 - ANSWERS-SSL 3.1 and TLS 1.0



Name the AES-based, wireless encryption mechanism used in the 802.11i wireless
Technical specification?

a) TKIP

b) WEP128

c) CCMP

d) CBC.MAC - ANSWERS-CCMP

,Bluetooth devices in this mode are "promiscuous" and do not employ any
mechanisms to prevent other Bluetooth-enabled devices from establishing
connections:

a) Security Mode 4

b) Encryption Level 1

c) Security Mode 1

d) EAL 4 - ANSWERS-Security Mode 1



Which security control requires the information system protect against an
individual falsely denying having performed a particular action?

a) AU-5 Response to Audit Processing Failures

b) SC-13 Use of Cryptography

c) A.12.2.3 Message integrity

d) AU-10 Non-Repudiation - ANSWERS-AU-10 Non-Repudiation



What are used between two parties that share a secret key to authenticate
information transmitted between these parties?

a) Digital Certificates

b) Message Authentication Codes

c) Pre-Master Secret

d) Elliptical Curve Token - ANSWERS-Message Authentication Codes

,This Standard defines a MAC that uses a cryptographic hash function in
conjunction with a secret key:

a) FIPS 186-4 Digital Signature Standard

b) SP 800-s7

c) FIPS 180-4 Secure Hash Standard

d) FIPS 198-1 Keyed-Hash Message Authentication Code (HMAC) - ANSWERS-FIPS
198-1 Keyed-Hash Message Authentication Code (HMAC)



What is the protocol, used by lPSec that negotiates connection settings,
authenticates endpoints to

each other, defines the security parameters of lPsec-protected connections,
negotiates secret keys,

and manages, updates, and deletes lPsec-protected communication channels? -
ANSWERS-Internet key Exchange (lKE)



Which VPN technologies are approved for use by Federal agencies? - ANSWERS-
lPSec, SSL/TLS (but not 55Lv3)



Name the AES-based, wireless encryption mechanism used in the 802.11i wireless
specification? - ANSWERS-CCMP



In which security mode are Bluetooth devices considered "promiscuous", and do
not employ any

mechanisms to prevent other Bluetooth-enabled devices from establishing
connections? - ANSWERS-Security Mode 1

, Non-repudiation is established by using what form of cryptographic service? -
ANSWERS-Digital Signature



Name the policy for a Common ldentification Standard for Federal Employees and
Contractors? - ANSWERS-HSPD-12



Which security control requires the information system protect against an
individualfalsely denying

having performed a particular action? - ANSWERS-AU-10 Non-repudiation



Which e-authentication level, described in the special publication 800-63, requires
multifactor

authentication, and the use of a hard token? - ANSWERS-Level 4



What is defined as a simulation of an emergency designed to validate the viability
of one or more aspects of an ISCP?

a) ISCP Test

b) ISCP Exercise

c) ISCP Training

d) ISCP Drill - ANSWERS-ISCP Exercise



What is the US-CERT incident category name and reporting timeframe for a CAT-3
incident?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Teacher101. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82191 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart