CSX Fundamentals Quiz Questions and Answers

What is correct about digital signatures?

Answer :
  • A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Answer :
  • ESP tranport mode

A regional bank hires your company to perform a security assessment on its network after a recent data breach. The attacker could steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the bank?

Answer :
  • Place a front-end web server in a demilitarized zone that only handles external web traffic

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures deployed?

Answer :
  • Residual risk

Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?

Answer :
  • Disk encryption

Outsourcing poses the greatest risk to an organization when it involves:

Answer :
  • Core business functions

Risk assessments should be performed:

Answer :
  • On a regular basis

Maintaining a high degree of confidence regarding the integrity of evidence requires a(n):

Answer :
  • Chain of custody

A firewall that tracks open connection-oriented protocol sessions is said to be:

Answer :
  • stateful

During which phase of the system development lifecycle (SDLC) should security first be considered?

Answer :
  • planing