Wednesday, October 23, 2019
Quiz 7
1. Access controls include the following a. Answers 1 and 2 only require employee logouts when the workstations are left unattended, prohibitions against visitors roaming the building in which computers are stored 2. Identity theft can be prevented by b. All of the above monitor credit reports regularly, sending personal information in encrypted form, immediately cancel missing credit cards, shred all personal documents after they are used 3. Which of the following can be used to detect whether confidential information has been disclosed c. A digital watermark 4.Which of the following is a fundamental control for protecting privacy d. Encryption 5. Which of the following are internationally recognized best practices for protecting the privacy of customers' personal information e. All of the above Disclosure to third parties only according to their privacy policy. , Use and retention of customer information as described by their privacy policy. , Organizations should explain the choices available and obtain their consent to the collection of customer data prior to its collection 6. The same key is used to encrypt and decrypt in which type of encryption systems f.Symmetric encryption systems Read also Quiz Week 4 7. Which of the following represents a process that takes plaintext and transforms into a short code g. Hashing 8. Which of the following uses encryption to create a secure pathway to transmit data h. Virtual Private Network (VPN 9. Which of the following represents an organization that issues documentation as to the validity and authenticity of digital identification such as digital certificates i. Certificate Authority 10. Which of the following is NOT a factor that can influence encryption strength j. Digital Certificate Length 1. What is the first step in protecting the confidentiality of intellectual property and other sensitive business information k. Identify where confidential data resides and who has access to it 12. Which of the following is a major privacy-related concern l. Answers 1 and 2 Spam, Identify theft 1. These are used to create digital signatures a. Asymmetric encryption and hashing 2. On March 3, 2008, a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jan's car while he was attending a conference in Cleveland, Ohio.After reporting the theft, Jiao considered the implications of the theft for the company's network security and concluded there was nothing to worry about because b. the data stored on the computer was encrypted 3. Using a combination of symmetric and asymmetric key encryption, Chris Kai sent a report to her home office in Syracuse, New York. She received an email acknowledgement that the document had been received and then, a few minutes later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report.This most likely explanation for this result is that c. the symmetric encryption key had been compromised 4. Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of d. the user of encrypted data 5. These systems use the same key to encrypt and to decrypt e. S ymmetric encryption 6. In a private key system the sender and the receiver have ________, and in the public key system they have ________ f. the same key; two separate keys 7.In a private key system the sender and the receiver have ________, and in the public key system they have ________ g. the same key; two separate keys 8. Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were secret messages to convey. One powerful method of encryption uses random digits. Two documents are prepared with the same random sequence of numbers. The spy is sent out with one and the spy master retains the other. The digits are used as follows. Suppose that the word to be encrypted is SPY and the random digits are 352.Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy the document used to encrypt it. This is an early example of h. symmetric key encryption 9. Which of the following isà notà associated with asymmetric encryption? i. Speed 10. A process that takes plaintext of any length and transforms it into a short code j. Hashing 11. k. 12. l. 13. m. 14. n. 15. o. 16. p. 17. q. 18. r. 19. s. 20. t. 21. u. 22. v. 23. w. 24. x. 25. y. 26. z. 27. {. 28. |.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.