Quiz 7

Only available on StudyMode
  • Topic: Public-key cryptography, Pretty Good Privacy, Certificate authority
  • Pages : 4 (770 words )
  • Download(s) : 62
  • Published : December 1, 2012
Open Document
Text Preview
1. Access controls include the following
a. Answers 1 and 2 only
require employee logouts when the workstations are left unattended, prohibitions against visitors roaming the building in which computers are stored 2. Identity theft can be prevented by
b. All of the above
monitor credit reports regularly, sending personal information in encrypted form, immediately cancel missing credit cards, shred all personal documents after they are used 3. Which of the following can be used to detect whether confidential information has been disclosed c. A digital watermark

4. Which of the following is a fundamental control for protecting privacy d. Encryption
5. Which of the following are internationally recognized best practices for protecting the privacy of customers' personal information e. All of the above
Disclosure to third parties only according to their privacy policy., Use and retention of customer information as described by their privacy policy., Organizations should explain the choices available and obtain their consent to the collection of customer data prior to its collection 6. The same key is used to encrypt and decrypt in which type of encryption systems f. Symmetric encryption systems

7. Which of the following represents a process that takes plaintext and transforms into a short code g. Hashing
8. Which of the following uses encryption to create a secure pathway to transmit data h. Virtual Private Network (VPN
9. Which of the following represents an organization that issues documentation as to the validity and authenticity of digital identification such as digital certificates i. Certificate Authority

10. Which of the following is NOT a factor that can influence encryption strength j. Digital Certificate Length
11. What is the first step in protecting the confidentiality of intellectual property and other sensitive business information...
tracking img