What lPSec protocol can be configured to provide compression for lPSec traffic?
a) AH
b) ESP
c) lPComp
d) rKE - ANSWERS-lPComp
Which of the following two protocols are actually different names for the same
protocol?
a) ssL 3.0
b) TLS 1.1
c) SSL 3.1
d) TLS 1.0 - ANSWERS-SSL 3.1 and TLS 1.0
Name the AES-based, wireless encryption mechanism used in the 802.11i wireless
Technical specification?
a) TKIP
b) WEP128
c) CCMP
d) CBC.MAC - ANSWERS-CCMP
,Bluetooth devices in this mode are "promiscuous" and do not employ any
mechanisms to prevent other Bluetooth-enabled devices from establishing
connections:
a) Security Mode 4
b) Encryption Level 1
c) Security Mode 1
d) EAL 4 - ANSWERS-Security Mode 1
Which security control requires the information system protect against an
individual falsely denying having performed a particular action?
What is the protocol, used by lPSec that negotiates connection settings,
authenticates endpoints to
each other, defines the security parameters of lPsec-protected connections,
negotiates secret keys,
and manages, updates, and deletes lPsec-protected communication channels? -
ANSWERS-Internet key Exchange (lKE)
Which VPN technologies are approved for use by Federal agencies? - ANSWERS-
lPSec, SSL/TLS (but not 55Lv3)
Name the AES-based, wireless encryption mechanism used in the 802.11i wireless
specification? - ANSWERS-CCMP
In which security mode are Bluetooth devices considered "promiscuous", and do
not employ any
mechanisms to prevent other Bluetooth-enabled devices from establishing
connections? - ANSWERS-Security Mode 1
, Non-repudiation is established by using what form of cryptographic service? -
ANSWERS-Digital Signature
Name the policy for a Common ldentification Standard for Federal Employees and
Contractors? - ANSWERS-HSPD-12
Which security control requires the information system protect against an
individualfalsely denying
having performed a particular action? - ANSWERS-AU-10 Non-repudiation
Which e-authentication level, described in the special publication 800-63, requires
multifactor
authentication, and the use of a hard token? - ANSWERS-Level 4
What is defined as a simulation of an emergency designed to validate the viability
of one or more aspects of an ISCP?
a) ISCP Test
b) ISCP Exercise
c) ISCP Training
d) ISCP Drill - ANSWERS-ISCP Exercise
What is the US-CERT incident category name and reporting timeframe for a CAT-3
incident?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Teacher101. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.