242 Chapter 10 ■ Practice Test 2
- A Type 2 authentication factor that generates dynamic passwords based on a time- or
algorithm-based system is what type of authenticator?
A. A PIV
B. A smart card
C. A token
D. A CAC - Fred’s new employer has hired him for a position with access to their trade secrets and
confidential internal data. What legal tool should they use to help protect their data if he
chooses to leave to work at a competitor?
A. A stop-loss order
B. An NDA
C. An AUP
D. Encryption - Which one of the following computing models allows the execution of multiple processes
on a single processor by having the operating system switch between them without requir-
ing modification to the applications?
A. Multitasking
B. Multiprocessing
C. Multiprogramming
D. Multithreading - How many possible keys exist when using a cryptographic algorithm that has an 8-bit
binary encryption key?
A. 16
B. 128
C. 256
D. 512 - What activity is being performed when you apply security controls based on the specific
needs of the IT system that they will be applied to?
A. Standardizing
B. Baselining
C. Scoping
D. Tailoring - During what phase of the electronic discovery process does an organization perform a
rough cut of the information gathered to discard irrelevant information?
A. Preservation
B. Identification
C. Collection
D. Processing