Filters
Question type

Encryption has a remarkably long and varied history.Spies have been using it to convey secret messages ever since there were secret messages to convey.One powerful method of encryption uses random digits.Two documents are prepared with the same random sequence of numbers.The spy is sent out with one and the spy master retains the other.The digits are used as follows.Suppose that the word to be encrypted is SPY and the random digits are 352.Then S becomes V (three letters after S) ,P becomes U (five letters after P) ,and Y becomes A (two letters after Y,restarting at A after Z) .The spy would encrypt a message and then destroy the document used to encrypt it.This is an early example of


A) a hashing algorithm.
B) asymmetric key encryption.
C) symmetric key encryption.
D) public key encryption.

Correct Answer

verifed

verified

If an organization asks you to disclose your social security number,but fails to establish a set of procedures and policies for protecting your privacy,the organization has likely violated which of the Generally Accepted Privacy Principles?


A) Management
B) Notice
C) Choice and consent
D) Use and retention

Correct Answer

verifed

verified

If an organization asks you to disclose your date of birth and your address,but fails to take any steps to protect your private information,the organization has likely violated which of the Generally Accepted Privacy Principles?


A) Collection
B) Access
C) Security
D) Quality

Correct Answer

verifed

verified

All of the following are associated with asymmetric encryption except


A) speed.
B) private keys.
C) public keys.
D) no need for key exchange.

Correct Answer

verifed

verified

A

If an organization asks you to disclose your date of birth and your address,but refuses to let you review or correct the information you provided,the organization has likely violated which of the Generally Accepted Privacy Principles?


A) Collection
B) Access
C) Security
D) Choice and consent

Correct Answer

verifed

verified

Encryption is one of the many ways to protect information in transit over the internet.

Correct Answer

verifed

verified

It is impossible to encrypt information


A) transmitted over the Internet.
B) stored on a hard drive.
C) printed on a report.
D) None of the above

Correct Answer

verifed

verified

If an organization asks you to disclose your social security number,but fails to tell you about its privacy policies and practices,the organization has likely violated which of the Generally Accepted Privacy Principles?


A) Management
B) Notice
C) Choice and consent
D) Use and retention

Correct Answer

verifed

verified

A client approached Paxton Uffe and said,"Paxton,I need for my customers to make payments online using credit cards,but I want to make sure that the credit card data isn't intercepted.What do you suggest?" Paxton responded,"The most effective solution is to implement


A) a data masking program."
B) a virtual private network."
C) a private cloud environment."
D) an encryption system with digital signatures."

Correct Answer

verifed

verified

Encryption has a remarkably long and varied history.The invention of writing was apparently soon followed by a desire to conceal messages.One of the earliest methods,attributed to an ancient Roman emperor,was the simple substitution of numbers for letters,for example A = 1, B = 2,etc.This is an example of


A) a hashing algorithm.
B) symmetric key encryption.
C) asymmetric key encryption.
D) a public key.

Correct Answer

verifed

verified

After the information that needs to be protected has been identified,what step should be completed next?


A) The information needs to be placed in a secure, central area.
B) The information needs to be encrypted.
C) The information needs to be classified in terms of its value to the organization.
D) The information needs to be depreciated.

Correct Answer

verifed

verified

These are used to create digital signatures.


A) asymmetric encryption and hashing
B) hashing and packet filtering
C) packet filtering and encryption
D) symmetric encryption and hashing

Correct Answer

verifed

verified

Information rights management software can do all of the following except


A) limiting access to specific files.
B) limit action privileges to a specific time period.
C) authenticate individuals accessing information.
D) specify the actions individuals granted access to information can perform.

Correct Answer

verifed

verified

Which of the following is not true regarding virtual private networks (VPN) ?


A) VPNs provide the functionality of a privately owned network using the Internet.
B) Using VPN software to encrypt information while it is in transit over the Internet in effect creates private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys.
C) It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network.
D) The cost of the VPN software is much less than the cost of leasing or buying the infrastructure (telephone lines, satellite links, communications equipment, etc.) needed to create a privately owned secure communications network.

Correct Answer

verifed

verified

If an organization asks you to disclose your date of birth and your address,but fails to establish any procedures for responding to customer complaints,the organization has likely violated which of the Generally Accepted Privacy Principles?


A) Collection
B) Access
C) Security
D) Monitoring and enforcement

Correct Answer

verifed

verified

Which of the following descriptions is not associated with symmetric encryption?


A) a shared secret key
B) faster encryption
C) lack of authentication
D) separate keys for each communication party

Correct Answer

verifed

verified

Which of the following is not one of the basic actions that an organization must take to preserve the confidentiality of sensitive information?


A) identification of information to be protected
B) backing up the information
C) controlling access to the information
D) training

Correct Answer

verifed

verified

B

Cindy Vindoolo logged on to her e-mail account to find that she had received 50 e-mails from a company called LifeCo that promised her extreme weight loss if she bought their diet pills.Cindy angrily deleted all 50 e-mails,realizing she was a victim of


A) telemarketing.
B) spam.
C) direct mail.
D) MLM.

Correct Answer

verifed

verified

B

Identify the first step in protecting the confidentiality of intellectual property below.


A) Identifying who has access to the intellectual property
B) Identifying the means necessary to protect the intellectual property
C) Identifying the weaknesses surrounding the creation of the intellectual property
D) Identifying what controls should be placed around the intellectual property

Correct Answer

verifed

verified

Which type of software blocks outgoing messages containing key words or phrases associated with an organization's sensitive data?


A) anti-virus software
B) data loss prevention software
C) a digital watermark
D) information rights software

Correct Answer

verifed

verified

Showing 1 - 20 of 51

Related Exams

Show Answer