75. Which of the following statements are true about the operation of a trusted platform module (TPM) chip?
1.
TPM chip is circumvented when it is shut off with physical access.2.
TPM chip has an owner password to protect data confidentiality.3.
TPM data is not cleared when the TPM chip is reset after the password is lost.4.
TPM data or owner password should be backed up to an alternative secure location.a.
1 and 3b.
2 and 4c.
3 and 4d.
1, 2, 3, and 476. A trusted platform module (TPM) chip can protect which of the following?
1.
Digital signatures2.
Digital certificates3.
Passwords4.
Cryptographic keysa.
1 and 2b.
2 and 4c.
3 and 4d.
1, 2, 3, and 4The TPM chip cannot protect the digital signatures and certificates because they require complex cryptographic algorithms for digital signature generation and verification and for validating the digital certificates.
77. Which of the following security controls are needed to protect digital and nondigital media at rest on selected secondary storage devices?
1.
Cryptography2.
Physical security controls3.
Locked storage container4.
Procedural security controlsa.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 478. Polyinstantiation approaches are designed to solve which of the following problems in databases?
a.
Lack of tranquilityb.
Lack of reflexivityc.
Lack of transitivityd.
Lack of duality79. Which of the following strategies is used to protect against risks and vulnerabilities at every stage of system, network, and product life cycles?
a.
Defense-in-breadthb.
Defense-in-depthc.
Defense-in-technologyd.
Defense-in-timeDefense-in-depth uses layers of security, defense-in technology uses compatible technology platforms, and defense-in-time considers different time zones in the world to operate global information systems.
80. Which of the following is a true statement about Active-X content?
1.
It is language-dependent.2.
It is platform-specific.3.
It is language-independent.4.
It is not platform-specific.a.
1 and 2b.
2 and 3c.
3 and 4d.
1 and 4