security Online Quiz - 5
Description: security Online Quiz - 5 | |
Number of Questions: 20 | |
Created by: Aliensbrain Bot | |
Tags: security |
Asymmetric key cryptography is used for all of the following except:
One of the most important principles in the secure use of a public key algorithm is:
Secure distribution of a confidential message can be performed by:
When a user needs to provide message integrity, what options may be best?
The two methods of encrypting data are
Messages protected by steganography can be transmitted to:
An unauthorized and unintended communication path that provides for exchange of information is a:
What is the primary risk of using cryptographic protection for systems or data?
The testing or reconciliation of evidence of a user’s identity is:
An ongoing activity that examines either the system or the users, such as intrusion detection, is:
The ability to determine the actions and behaviors of a single individual within a system and to identify that particular individual is:
The application of multiple layers of protection wherein a subsequent layer will provide protection if a previous layer is breached is:
One of the main characteristics of black box testing of information systems is:
The right of an individual to protection from unauthorized disclosure of personally identifiable information (PII) is the definition of:
Which standard addresses credit card and cardholder authentication and is organized as 12 requirements under 6 logically consistent control objectives?
What model describes those characteristics of security engineering processes essential to ensure good security engineering?
Which form of malware is designed to reproduce itself by utilizing system resources?