A) speed.
B) private keys.
C) public keys.
D) no need for key exchange.
Correct Answer
verified
Multiple Choice
A) limiting access to specific files.
B) limit action privileges to a specific time period.
C) authenticate individuals accessing information.
D) specify the actions individuals granted access to information can perform.
Correct Answer
verified
Multiple Choice
A) Collection
B) Access
C) Security
D) Monitoring and enforcement
Correct Answer
verified
Multiple Choice
A) telemarketing.
B) spam.
C) direct mail.
D) MLM.
Correct Answer
verified
Multiple Choice
A) VPNs provide the functionality of a privately owned network using the Internet.
B) Using VPN software to encrypt information while it is in transit over the Internet in effect creates private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys.
C) It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network.
D) The cost of the VPN software is much less than the cost of leasing or buying the infrastructure (telephone lines, satellite links, communications equipment, etc.) needed to create a privately owned secure communications network.
Correct Answer
verified
Multiple Choice
A) Management
B) Notice
C) Choice and consent
D) Use and retention
Correct Answer
verified
Multiple Choice
A) Collection
B) Access
C) Security
D) Choice and consent
Correct Answer
verified
Multiple Choice
A) a hashing algorithm.
B) symmetric key encryption.
C) asymmetric key encryption.
D) a public key.
Correct Answer
verified
Multiple Choice
A) a data masking program."
B) a virtual private network."
C) a private cloud environment."
D) an encryption system with digital signatures."
Correct Answer
verified
Multiple Choice
A) The information needs to be placed in a secure, central area.
B) The information needs to be encrypted.
C) The information needs to be classified in terms of its value to the organization.
D) The information needs to be depreciated.
Correct Answer
verified
Multiple Choice
A) asymmetric encryption and hashing
B) hashing and packet filtering
C) packet filtering and encryption
D) symmetric encryption and hashing
Correct Answer
verified
Multiple Choice
A) Collection
B) Access
C) Security
D) Quality
Correct Answer
verified
Multiple Choice
A) a shared secret key
B) faster encryption
C) lack of authentication
D) separate keys for each communication party
Correct Answer
verified
Multiple Choice
A) Identifying who has access to the intellectual property
B) Identifying the means necessary to protect the intellectual property
C) Identifying the weaknesses surrounding the creation of the intellectual property
D) Identifying what controls should be placed around the intellectual property
Correct Answer
verified
Multiple Choice
A) transmitted over the Internet.
B) stored on a hard drive.
C) printed on a report.
D) None of the above
Correct Answer
verified
Multiple Choice
A) a hashing algorithm.
B) asymmetric key encryption.
C) symmetric key encryption.
D) public key encryption.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) anti-virus software
B) data loss prevention software
C) a digital watermark
D) information rights software
Correct Answer
verified
Multiple Choice
A) identification of information to be protected
B) backing up the information
C) controlling access to the information
D) training
Correct Answer
verified
Multiple Choice
A) Management
B) Notice
C) Choice and consent
D) Use and retention
Correct Answer
verified
Showing 1 - 20 of 51
Related Exams