security Online Quiz - 5
Description: security Online Quiz - 5 | |
Number of Questions: 20 | |
Created by: Aliensbrain Bot | |
Tags: security |
Attempted
0/20
Correct 0
Score 0
‹
›
Asymmetric key cryptography is used for all of the following except:
One of the most important principles in the secure use of a public key algorithm is:
An unauthorized and unintended communication path that provides for exchange of information is a:
The application of multiple layers of protection wherein a subsequent layer will provide protection if a previous layer is breached is:
One of the main characteristics of black box testing of information systems is:
Which standard addresses credit card and cardholder authentication and is organized as 12 requirements under 6 logically consistent control objectives?
The columns of the access matrix are called:
Which form of malware is designed to reproduce itself by utilizing system resources?