Correct Answer
verified
View Answer
Multiple Choice
A) the banking industry
B) the credit card industry
C) the federal government
D) the retail industry
Correct Answer
verified
Multiple Choice
A) 8
B) 56
C) 256
D) 512
Correct Answer
verified
Multiple Choice
A) social network security issue.
B) cloud security issue.
C) mobile platform security issue.
D) sniffing issue.
Correct Answer
verified
Multiple Choice
A) Crackers
B) White hats
C) Grey hats
D) Hacktivists
Correct Answer
verified
Multiple Choice
A) public key cryptography.
B) secret key cryptography.
C) PGP.
D) PKI.
Correct Answer
verified
Multiple Choice
A) DES
B) SSL/TLS
C) VPN
D) HTTP
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks
Correct Answer
verified
Multiple Choice
A) firewalls.
B) application gateways.
C) dual home systems.
D) packet filters.
Correct Answer
verified
Multiple Choice
A) confidentiality
B) availability
C) message integrity
D) nonrepudiation
Correct Answer
verified
Multiple Choice
A) DES
B) NFC
C) IM
D) text messaging
Correct Answer
verified
Multiple Choice
A) subject's private key.
B) subject's public key.
C) digital signature of the certification authority.
D) digital certificate serial number.
Correct Answer
verified
Multiple Choice
A) data integrity
B) technology
C) organizational policies
D) laws and industry standards
Correct Answer
verified
Multiple Choice
A) A VPN provides both confidentiality and integrity.
B) A VPN uses both authentication and encryption.
C) A VPN uses a dedicated secure line.
D) The primary use of VPNs is to establish secure communications among business partners.
Correct Answer
verified
Multiple Choice
A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) public key cryptography uses two mathematically related digital keys.
B) public key cryptography ensures authentication of the sender.
C) public key cryptography does not ensure message integrity.
D) public key cryptography is based on the idea of irreversible mathematical functions.
Correct Answer
verified
Multiple Choice
A) China.
B) Russia.
C) Nigeria.
D) North Korea.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 61 - 80 of 85
Related Exams