Wednesday, July 17, 2019

Quiz 7

1. Access controls include the quest a. Answers 1 and 2 only require employee logouts when the workstations ar left field unattended, prohibitions against visitors roaming the building in which ready reck mavenrs argon stored 2. Identity stealth can be prevented by b. All of the to a higher place monitor cite reports regularly, sending personal tuition in enrolled form, immediately cancel missing credit cards, shred all personal documents subsequently they are apply 3. Which of the following can be apply to detect whether confidential information has been disclosed c. A digital watermark4.Which of the following is a unplumbed control for protect hiding d. Encryption 5. Which of the following are internationally recognized best practices for protecting the privacy of customers personal information e. All of the above Disclosure to third parties only according to their privacy policy. , Use and retention of customer information as described by their privacy policy. , Orga nizations should explain the choices operable and obtain their consent to the collection of customer information prior to its collection 6. The comparable make is used to encrypt and decrypt in which type of encoding placements f.Symmetric encryption systemsRead also Quiz calendar week 47. Which of the following represents a process that takes plaintext and transforms into a short code g. Hashing 8. Which of the following uses encryption to cause a secure pathway to transmit data h. Virtual Private Network (VPN 9. Which of the following represents an governing body that issues documentation as to the validity and authenticity of digital identification such as digital certificates i. award Authority 10. Which of the following is NOT a operator that can influence encryption strength j. digital Certificate Length 1. What is the first step in protecting the confidentiality of intellectual property and other mass medium business information k. Identify where confidential da ta resides and who has access to it 12. Which of the following is a major privacy-related carry on l. Answers 1 and 2 Spam, Identify theft 1. These are used to create digital signatures a. Asymmetric encryption and hashing 2. On March 3, 2008, a laptop computer belonging to Folding Squid Technology was stolen from the soundbox of Jiao Jans car while he was attending a conference in Cleveland, Ohio.After reporting the theft, Jiao considered the implications of the theft for the companys profits security and concluded there was nothing to touch on about because b. the data stored on the computer was encrypted 3. victimization a combination of symmetric and asymmetric learn encryption, Chris Kai sent a report to her home magnate in Syracuse, New York. She received an email realization that the document had been received and then, a few proceedings later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report. This most likely explanation for this result is that c. the symmetric encryption trace had been compromised 4. Asymmetric paint encryption combined with the information provided by a certificate authority allows singular identification of d. the user of encrypted data 5. These systems use the analogous key to encrypt and to decrypt e. Symmetric encryption 6. In a private key system the sender and the receiver have ________, and in the popular key system they have ________ f. the same key two separate keys 7.In a private key system the sender and the receiver have ________, and in the public key system they have ________ g. the same key two separate keys 8. Encryption has a remarkably long and varied history. Spies have been using it to convey sequestered subjects ever since there were secret messages to convey. One powerful method of encryption uses haphazard digits. Two documents are prepared with the same stochastic sequence of numbers. The spy is sent out with one and the spy master retains the other. The digits are used as follows. Suppose that the word to be encrypted is SPY and the ergodic digits are 352.Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy the document used to encrypt it. This is an early example of h. symmetric key encryption 9. Which of the following isnotassociated with asymmetric encryption? i. look sharp 10. A process that takes plaintext of any length and transforms it into a short code j. Hashing 11. k. 12. l. 13. m. 14. n. 15. o. 16. p. 17. q. 18. r. 19. s. 20. t. 21. u. 22. v. 23. w. 24. x. 25. y. 26. z. 27. . 28. .

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.