A) Data restoration plan.
B) Disaster recovery plan.
C) System security policy.
D) System hardware policy.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) To establish a framework for controlling the design, security, and use of computer programs throughout an organization.
B) To ensure that data storage media are subject to authorization prior to access, change, or destruction.
C) To formalize standard, rules, and procedures to ensure the organization's control are properly executed.
D) To monitor the use of system software to prevent unauthorized access to system software and computer programs.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) It is a process that establishes the origin of information or determines the identity of a user, process, or device.
B) One key is used for encryption and decryption purposes in the authentication process.
C) Successful authentication can prevent repudiation in electronic transactions.
D) We need to use asymmetric-key encryption to authenticate the sender of a document or data set.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Use of a screen saver with a password.
B) Use of a firewall.
C) Encryption of data files.
D) Automatic log-off of inactive users.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) To use symmetric-key encryption, each user needs two different keys.
B) Most companies prefer using symmetric-key encryption than asymmetric-key encryption method.
C) Both symmetric-key and asymmetric-key encryption methods require the involvement of a certificate authority.
D) When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods.
Correct Answer
verified
Multiple Choice
A) Users are assigned passwords when accounts are created, but do not change them.
B) Users have accounts on several systems with different passwords.
C) Users write down their passwords on a note paper, and carry it with them.
D) Users select passwords that are not part of online password dictionary.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Go2Ca!ifornia4fun
B) language
C) jennyjenny
D) pass56word
Correct Answer
verified
Multiple Choice
A) Parity check.
B) Password as a personal identification code.
C) Check digit.
D) Echo check.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Daily backup.
B) Network security.
C) Business continuity.
D) Backup power.
Correct Answer
verified
Showing 21 - 40 of 47
Related Exams