
Which of the following is the best cryptographic function used to enforce confidentiality? (Wentz QOTD)
A. One-time pad (OTP)
B. RSA Digital Signature Algorithm
C. Time-based One-Time Password (TOTP)
D. Hash-based Message Authentication Codes (HMAC)

Which of the following is the best cryptographic function used to enforce confidentiality? (Wentz QOTD)
A. One-time pad (OTP)
B. RSA Digital Signature Algorithm
C. Time-based One-Time Password (TOTP)
D. Hash-based Message Authentication Codes (HMAC)

A France computer manufacturer submits a trusted computer system for the Common Criteria evaluation and receives an EAL 7. The system supports the security policy that allows a user cleared as confidential to prepare reports to the supervisor at the secret level. Which of the following is least likely to be used in the design as a formal model? (Wentz QOTD)
A. Finite state machine
B. Information flow model
C. Non-interference model
D. Mandatory access control

According to Dorothy E. Denning, “the lattice properties permit concise formulations of the security requirements of different existing systems and facilitate the construction of mechanisms that enforce security.” Which of the following is not a lattice-based access control model? (Wentz QOTD)
A. Biba model
B. Clark-Wilson model
C. Brewer and Nash model
D. Bell-LaPadula (BLP) model

A trusted computer system is typically designed based on a formal model. Which of the following is incorrect about the Trusted Computer System Evaluation Criteria (TCSEC)? (Wentz QOTD)
A. TCSEC is developed based on the Bell-LaPadula Model (BLP).
B. The clearance/classification scheme is expressed in terms of a lattice.
C. A trusted path ensures recovery without a compromise if secure state transitions fail.
D. Discretionary access control enables objects sharing by named individuals or groups, or both.

A software developer checked in new code and pushed it into the remote code repository. Which of the following activities is most likely to happen immediately after the push? (Wentz QOTD)
A. Unit testing
B. Integration testing
C. Regression testing
D. Management acceptance of residual risk

When it comes to software test coverage analysis, which of the following has the finest granularity of testing? (Wentz QOTD)
A. Use cases
B. Test scenarios
C. Lines of code (LOC)
D. Expressions and decision structures

The symmetric cipher uses a secret key to encrypt and decrypt data. Which of the following has the least overhead in negotiating a shared key between two communication parties? (Wentz QOTD)
A. Web of trust
B. Diffie-Hellman
C. Trusted couriers
D. Public key infrastructure

You are evaluating alternative sites to support the continuous delivery of products and services if a disaster materializes. Which of the following is the best benefit of a cold site? (Wentz QOTD)
A. Shorten the relocation time
B. Provide off-site data vaulting
C. Respond to e-discovery requests
D. Reserve alternative computing capacities

As a system owner, you are planning for the recovery of a core system to support business continuity. Which of the following is not a recovery objective specific to your system? (Wentz QOTD)
A. Recovery Point Objective (RPO)
B. Recovery Time Objective (RTO)
C. Service Delivery Objective (SDO)
D. Maximum Tolerable Downtime (MTD)

Small businesses typically have limited resources, so that software developers may have to support operations. If it’s unavoidable for a developer to assume development and operations activities, which of the following is the best arrangement? (Wentz QOTD)
A. Dual control
B. Segregation of Duties
C. Separation of Privilege
D. M of N Control