Filters
Question type

Study Flashcards

What dimensions do digital signatures and hash digests add to public key cryptography and how do they work?

Correct Answer

verifed

verified

Digital signatures and hash digests can ...

View Answer

PCI-DSS is a standard established by which of the following?


A) the banking industry
B) the credit card industry
C) the federal government
D) the retail industry

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

The Data Encryption Standard uses a(n) ________-bit key.


A) 8
B) 56
C) 256
D) 512

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Accessing data without authorization on Dropbox is an example of a:


A) social network security issue.
B) cloud security issue.
C) mobile platform security issue.
D) sniffing issue.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

________ typically attack governments, organizations, and sometimes individuals for political purposes.


A) Crackers
B) White hats
C) Grey hats
D) Hacktivists

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Asymmetric key cryptography is also known as:


A) public key cryptography.
B) secret key cryptography.
C) PGP.
D) PKI.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following is the most common protocol for securing a digital channel of communication?


A) DES
B) SSL/TLS
C) VPN
D) HTTP

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the leading cause of data breaches?


A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Proxy servers are also known as:


A) firewalls.
B) application gateways.
C) dual home systems.
D) packet filters.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following dimensions of e-commerce security is not provided for by encryption?


A) confidentiality
B) availability
C) message integrity
D) nonrepudiation

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?


A) DES
B) NFC
C) IM
D) text messaging

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A digital certificate contains all of the following except the:


A) subject's private key.
B) subject's public key.
C) digital signature of the certification authority.
D) digital certificate serial number.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not a key factor for establishing e-commerce security?


A) data integrity
B) technology
C) organizational policies
D) laws and industry standards

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following statements is not true?


A) A VPN provides both confidentiality and integrity.
B) A VPN uses both authentication and encryption.
C) A VPN uses a dedicated secure line.
D) The primary use of VPNs is to establish secure communications among business partners.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

All of the following are limitations of the existing online credit card payment system except:


A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

WannaCry is an example of ransomware.

A) True
B) False

Correct Answer

verifed

verified

All of the following statements about public key cryptography are true except:


A) public key cryptography uses two mathematically related digital keys.
B) public key cryptography ensures authentication of the sender.
C) public key cryptography does not ensure message integrity.
D) public key cryptography is based on the idea of irreversible mathematical functions.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:


A) China.
B) Russia.
C) Nigeria.
D) North Korea.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The creation of Bitcoins consumes a significant amount of energy.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 85

Related Exams

Show Answer