Deck 10: Information Systems Acquisition, Development, and Maintenance

Full screen (f)
exit full mode
Question
Which of the following is used to associate a public key with an identity?

A) Encryption
B) Digital hash
C) Digital certificate
D) Digital signature
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following statements about asymmetric key cryptography is true?

A) Asymmetric key cryptography uses one shared key.
B) Asymmetric key cryptography is also called private key cryptography.
C) Asymmetric key cryptography uses two keys called public keys.
D) Asymmetric key cryptography is also called public key cryptography.
Question
Which of the following issues and maintains digital certificates?

A) Registration authority
B) Certification authority
C) Public key infrastructure
D) Client nodes
Question
Which of the following tasks is part of the disposal phase of the SDLC?

A) Authorization
B) Conducting risk assessment
C) Archiving information and sanitization of media
D) Adding hardware and software
Question
Identification of compliance requirements is done during which of the following phases of the SDLC?

A) Initiation
B) Development/acquisition
C) Implementation/assessment
D) Operations/maintenance
Question
Which of the following is the most common web application security flaw?

A) Failure to validate output
B) Failure to validate input
C) Dynamic data validation
D) Static data validation
Question
Symmetric key cryptography uses which of the following?

A) One public key
B) One shared key
C) Two public keys
D) One public and one private key
Question
Which of the following is one of the most popular symmetric algorithms of recent years?

A) AES
B) RSA
C) DES
D) IPsec
Question
Which of the following statements about symmetric key cryptography is not true?

A) Symmetric key cryptography uses one shared key.
B) Symmetric algorithms can provide confidentiality.
C) Symmetric algorithms can provide nonrepudiation and authenticity.
D) Symmetric key cryptography uses a single secret key.
Question
Which of the following is a component of PKI?

A) Certification authority
B) Registration authority
C) Client nodes
D) All of the above
Question
Which of the following is the process of creating a numeric value that represents the original text?

A) Encryption
B) Decryption
C) Hashing
D) Key management
Question
Which of the following provides confidentiality?

A) Encryption
B) Decryption
C) Hashing
D) Key management
Question
Public key cryptography uses which of the following?

A) A shared key
B) A public key
C) A private key
D) Both a public and a private key
Question
Which of the following provides a standardized process for all phases of any system development or acquisition effort?

A) COTS
B) SDLC
C) NIST
D) CIA
Question
In which phase of the SDLC are systems and products in place and operating, enhancements and/or modifications to the system are being developed and tested, and hardware and software components are added or replaced?

A) Initiation
B) Development/acquisition
C) Operations/maintenance
D) Implementation/assessment
Question
Which of the following is a hybrid of a beta and a final release version of a software product?

A) Release candidate
B) Alpha phase
C) General availability
D) Go live
Question
Which of the following is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted?

A) NIST
B) GLBA
C) MITRE
D) OWASP
Question
Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate?

A) Certification authority
B) Registration authority
C) Client nodes
D) Digital certificate
Question
Which of the following is not a best practice for cryptographic key management?

A) Keys should be transmitted and stored by secure means.
B) Keys should be properly destroyed when their lifetime ends.
C) Keys should be presented in clear text.
D) Key values should be random, and the full spectrum of the keyspace should be used.
Question
Which of the following is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization?

A) ISO
B) SAMM
C) OWASP
D) SDLC
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Information Systems Acquisition, Development, and Maintenance
1
Which of the following is used to associate a public key with an identity?

A) Encryption
B) Digital hash
C) Digital certificate
D) Digital signature
Digital certificate
2
Which of the following statements about asymmetric key cryptography is true?

A) Asymmetric key cryptography uses one shared key.
B) Asymmetric key cryptography is also called private key cryptography.
C) Asymmetric key cryptography uses two keys called public keys.
D) Asymmetric key cryptography is also called public key cryptography.
Asymmetric key cryptography is also called public key cryptography.
3
Which of the following issues and maintains digital certificates?

A) Registration authority
B) Certification authority
C) Public key infrastructure
D) Client nodes
Certification authority
4
Which of the following tasks is part of the disposal phase of the SDLC?

A) Authorization
B) Conducting risk assessment
C) Archiving information and sanitization of media
D) Adding hardware and software
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Identification of compliance requirements is done during which of the following phases of the SDLC?

A) Initiation
B) Development/acquisition
C) Implementation/assessment
D) Operations/maintenance
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is the most common web application security flaw?

A) Failure to validate output
B) Failure to validate input
C) Dynamic data validation
D) Static data validation
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
Symmetric key cryptography uses which of the following?

A) One public key
B) One shared key
C) Two public keys
D) One public and one private key
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is one of the most popular symmetric algorithms of recent years?

A) AES
B) RSA
C) DES
D) IPsec
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following statements about symmetric key cryptography is not true?

A) Symmetric key cryptography uses one shared key.
B) Symmetric algorithms can provide confidentiality.
C) Symmetric algorithms can provide nonrepudiation and authenticity.
D) Symmetric key cryptography uses a single secret key.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is a component of PKI?

A) Certification authority
B) Registration authority
C) Client nodes
D) All of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is the process of creating a numeric value that represents the original text?

A) Encryption
B) Decryption
C) Hashing
D) Key management
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following provides confidentiality?

A) Encryption
B) Decryption
C) Hashing
D) Key management
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Public key cryptography uses which of the following?

A) A shared key
B) A public key
C) A private key
D) Both a public and a private key
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following provides a standardized process for all phases of any system development or acquisition effort?

A) COTS
B) SDLC
C) NIST
D) CIA
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
In which phase of the SDLC are systems and products in place and operating, enhancements and/or modifications to the system are being developed and tested, and hardware and software components are added or replaced?

A) Initiation
B) Development/acquisition
C) Operations/maintenance
D) Implementation/assessment
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is a hybrid of a beta and a final release version of a software product?

A) Release candidate
B) Alpha phase
C) General availability
D) Go live
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted?

A) NIST
B) GLBA
C) MITRE
D) OWASP
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate?

A) Certification authority
B) Registration authority
C) Client nodes
D) Digital certificate
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is not a best practice for cryptographic key management?

A) Keys should be transmitted and stored by secure means.
B) Keys should be properly destroyed when their lifetime ends.
C) Keys should be presented in clear text.
D) Key values should be random, and the full spectrum of the keyspace should be used.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization?

A) ISO
B) SAMM
C) OWASP
D) SDLC
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.