Sunday, March 3, 2019
Quiz 7
1. Access controls include the by-line a. Answers 1 and 2 only require employee logouts when the workstations ar left unattended, prohibitions against visitors roaming the mental synthesis in which computers be stored 2. Identity theft can be prevented by b. All of the above monitor credit reports regularly, sending personal cultivation in encrypted form, immediately cancel missing credit cards, shred solely personal documents after they are usaged 3. Which of the quest can be employ to detect whether confidential study has been disclosed c. A digital watermark4.Which of the following is a fundamental control for defend covert d. Encryption 5. Which of the following are internationally recognized best practices for protecting the privacy of customers personal information e. All of the above Disclosure to tertiary parties only according to their privacy policy. , Use and retention of customer information as described by their privacy policy. , Organizations should explain the choices available and chance their con move to the collection of customer data prior to its collection 6. The uniform get a line is used to encrypt and decrypt in which type of encoding systems f.Symmetric encryption systemsRead also Quiz Week 47. Which of the following represents a process that takes plaintext and transforms into a short code g. Hashing 8. Which of the following uses encryption to create a secure pathway to transmit data h. practical(prenominal) Private Network (VPN 9. Which of the following represents an organization that issues documentation as to the rigour and authenticity of digital identification such as digital certificates i. security department Authority 10. Which of the following is NOT a factor that can exploit encryption strength j. Digital Certificate Length 1. What is the first misuse in protecting the confidentiality of intellectual property and other sensitive pedigree information k. Identify where confidential data resides and who ha s access to it 12. Which of the following is a major privacy-related concern l. Answers 1 and 2 Spam, Identify theft 1. These are used to create digital signatures a. Asymmetric encryption and hashing 2. On marching 3, 2008, a laptop computer belonging to Folding Squid engineering was stolen from the trunk of Jiao Jans car while he was attending a host in Cleveland, Ohio.After reporting the theft, Jiao considered the implications of the theft for the companys network security and concluded on that point was nothing to worry about because b. the data stored on the computer was encrypted 3. employ a combination of symmetric and asymmetric draw encryption, Chris Kai sent a report to her home office in Syracuse, New York. She trustworthy an netmail acknowledgement that the document had been received and then, a few minutes later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report.This most likely explanation for this result is that c. the symmetric encryption attain had been compromised 4. Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of d. the user of encrypted data 5. These systems use the same key to encrypt and to decrypt e. Symmetric encryption 6. In a private key system the vector and the receiver withstand ________, and in the public key system they ask ________ f. the same key two separate keys 7.In a private key system the sender and the receiver have ________, and in the public key system they have ________ g. the same key two separate keys 8. Encryption has a unco long and varied history. Spies have been using it to convey secret messages ever since there were secret messages to convey. One powerful method of encryption uses hit-or-miss digits. Two documents are prepared with the same random sequence of numbers. The recognize is sent out with one and the spy master retains the other. The digit s are used as follows. Suppose that the word to be encrypted is SPY and the random digits are 352.Then S becomes V (three letter after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then disgrace the document used to encrypt it. This is an early example of h. symmetric key encryption 9. Which of the following isnotassociated with asymmetric encryption? i. Speed 10. A process that takes plaintext of any length and transforms it into a short code j. Hashing 11. k. 12. l. 13. m. 14. n. 15. o. 16. p. 17. q. 18. r. 19. s. 20. t. 21. u. 22. v. 23. w. 24. x. 25. y. 26. z. 27. . 28. .
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.