Wednesday, May 22, 2019

Quiz 7

1. Access controls include the sideline a. Answers 1 and 2 only require employee logouts when the workstations are left(a) unattended, prohibitions against visitors roaming the building in which computing machines are stored 2. Identity theft can be prevented by b. All of the above monitor credit reports regularly, sending personal nurture in encrypted form, immediately cancel missing credit cards, shred all personal documents after they are utilise 3. Which of the following can be used to detect whether confidential information has been disclosed c. A digital watermark4.Which of the following is a fundamental control for protecting solitude d. Encryption 5. Which of the following are internationally recognized best practices for protecting the privacy of customers personal information e. All of the above Disclosure to third parties only according to their privacy policy. , Use and retention of customer information as described by their privacy policy. , Organizations should ex plain the choices available and obtain their consent to the collection of customer entropy prior to its collection 6. The said(prenominal) name is used to encrypt and decrypt in which type of encryption systems f.Symmetric encryption systemsRead also Quiz week 47. Which of the following represents a process that takes plaintext and transforms into a short code g. Hashing 8. Which of the following uses encryption to create a secure pathway to transmit entropy h. Virtual Private Network (VPN 9. Which of the following represents an organization that issues documentation as to the validity and authenticity of digital identification such as digital certificates i. enfranchisement Authority 10. Which of the following is NOT a factor that can influence encryption strength j. Digital Certificate Length 1. What is the first step in protecting the confidentiality of intellectual property and other sensitive business information k. Identify where confidential data resides and who has acc ess to it 12. Which of the following is a major privacy-related furbish up l. Answers 1 and 2 Spam, Identify theft 1. These are used to create digital signatures a. Asymmetric encryption and hashing 2. On March 3, 2008, a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jans car while he was attending a conference in Cleveland, Ohio.After reporting the theft, Jiao considered the implications of the theft for the companys network security and concluded there was nothing to worry about because b. the data stored on the computer was encrypted 3. Using a combination of symmetric and asymmetric rouge encryption, Chris Kai sent a report to her home office in Syracuse, New York. She received an email acknowledgement that the document had been received and then, a few transactions later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report.This most likely explanation for this r esult is that c. the symmetric encryption key had been compromised 4. Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of d. the user of encrypted data 5. These systems use the same key to encrypt and to decrypt e. Symmetric encryption 6. In a private key system the sender and the receiver have ________, and in the frequent key system they have ________ f. the same key two separate keys 7.In a private key system the sender and the receiver have ________, and in the public key system they have ________ g. the same key two separate keys 8. Encryption has a remarkably long and varied history. Spies have been employ it to convey secret messages ever since there were secret messages to convey. One powerful method of encryption uses stochastic digits. Two documents are prepared with the same ergodic sequence of numbers. The spy is sent out with one and the spy master retains the other. The digits are used as follo ws. Suppose that the word to be encrypted is SPY and the random digits are 352.Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy the document used to encrypt it. This is an early example of h. symmetric key encryption 9. Which of the following isnotassociated with asymmetric encryption? i. Speed 10. A process that takes plaintext of any length and transforms it into a short code j. Hashing 11. k. 12. l. 13. m. 14. n. 15. o. 16. p. 17. q. 18. r. 19. s. 20. t. 21. u. 22. v. 23. w. 24. x. 25. y. 26. z. 27. . 28. .

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

William D. Ruckelshaus and the EPA

Presentation The case being talked about, William R. Ruckelshaus and Environment Protection Agency, is extremely significant as it raises th...