ISACA e-Symposium 0124

207 views
Skip to first unread message

moris

unread,
Feb 13, 2012, 5:10:55 AM2/13/12
to CISA 201110
不知道有沒有人寫過e-Symposium的題目,通過可以得到CPE..
對了9題(ADBBB BDACA), 第一題忘記co了..

Question 2 of 10
(Edward Ray) For both client (Y) and server (X) authentication, the
SSL Client needs:
A) The personal certificate issued to the client by CA X
B) The client's private key
C) The CA certificate for CA Y or the personal certificate issued to
the server by CA Y
D) A, B and C
E) A and B
F) A and C

Question 3 of 10
(Edward Ray) A Fully Authenticated SSL Certificate is an entry-level
SSL Certificate.
A) True
B) False

Question 4 of 10
(Larry Seltzer) What key strength is considered safe?
A) 512 bits or higher, 1024 recommended
B) 1024 bits or higher, 2048 recommended
C) 2048 bits or higher, 4096 recommended

Question 5 of 10
(Larry Seltzer) Which is the mainstream hash algorithm in use today?
A) SHA-1
B) SHA-2
C) SHA-3
D) MD-5

Question 6 of 10
(Larry Seltzer) Self-signed certificates on the Internet are a bad
idea because:
A) They don't support secure key sizes
B) They can't provide secure authentication
C) They don't work properly with all browsers
D) They don't work properly with all web servers

Question 7 of 10
(Leighton R. Johnson III) How many authentication factors are defined
as strong authentication?
A) Token
B) 1
C) 0
D) 2+
E) All

Question 8 of 10
(Leighton R. Johnson III) What are the 2 types of Identification &
Authentication?
A) User & Device
B) MAC & TCP/IP
C) Network & Local
D) Who & What you are

Question 9 of 10
(Leighton R. Johnson III) User ID’s must be?
A) Very descriptive of the user
B) The same for privilege and non-privilege accounts
C) Unique
D) Private and not documented

Question 10 of 10
(Leighton R. Johnson III) True or False: Authentication method should
provide enhancement of network security through the prevention of
eavesdropping
A) True
B) False
Reply all
Reply to author
Forward
0 new messages