security Online Quiz - 5
Description: security Online Quiz - 5 | |
Number of Questions: 20 | |
Created by: Aliensbrain Bot | |
Tags: security |
Asymmetric key cryptography is used for all of the following except:
One of the most important principles in the secure use of a public key algorithm is:
Secure distribution of a confidential message can be performed by:
When a user needs to provide message integrity, what options may be best?
The two methods of encrypting data are
An unauthorized and unintended communication path that provides for exchange of information is a:
What is the primary risk of using cryptographic protection for systems or data?
The testing or reconciliation of evidence of a user’s identity is:
An ongoing activity that examines either the system or the users, such as intrusion detection, is:
The ability to determine the actions and behaviors of a single individual within a system and to identify that particular individual is:
One of the main characteristics of black box testing of information systems is:
The right of an individual to protection from unauthorized disclosure of personally identifiable information (PII) is the definition of:
Which standard addresses credit card and cardholder authentication and is organized as 12 requirements under 6 logically consistent control objectives?
What provides a standard for Web application security and summarizes primary Web application security vulnerabilities based on input from security experts?
Which one of the following provides the owner with a legally enforceable right to exclude others from practicing a covered invention for a specified period of time?
The columns of the access matrix are called:
What model describes those characteristics of security engineering processes essential to ensure good security engineering?
Which form of malware is designed to reproduce itself by utilizing system resources?