security Online Quiz - 5
Description: security Online Quiz - 5 | |
Number of Questions: 20 | |
Created by: Aliensbrain Bot | |
Tags: security |
Asymmetric key cryptography is used for all of the following except:
One of the most important principles in the secure use of a public key algorithm is:
Secure distribution of a confidential message can be performed by:
When a user needs to provide message integrity, what options may be best?
Messages protected by steganography can be transmitted to:
An unauthorized and unintended communication path that provides for exchange of information is a:
An ongoing activity that examines either the system or the users, such as intrusion detection, is:
The ability to determine the actions and behaviors of a single individual within a system and to identify that particular individual is:
The application of multiple layers of protection wherein a subsequent layer will provide protection if a previous layer is breached is:
One of the main characteristics of black box testing of information systems is:
The right of an individual to protection from unauthorized disclosure of personally identifiable information (PII) is the definition of:
Which standard addresses credit card and cardholder authentication and is organized as 12 requirements under 6 logically consistent control objectives?
What provides a standard for Web application security and summarizes primary Web application security vulnerabilities based on input from security experts?
Which one of the following provides the owner with a legally enforceable right to exclude others from practicing a covered invention for a specified period of time?
The columns of the access matrix are called:
What model describes those characteristics of security engineering processes essential to ensure good security engineering?
Which form of malware is designed to reproduce itself by utilizing system resources?