AIS Chapter 12
Able wants to send an encrypted document to Baker as an email attachment. If Able wants to securely send Baker the key to decrypt the document, Able should encrypt the key using ___________.
A. Able's public asymmetric key B. Able's private asymmetric key C. Baker's public asymmetric key D. Baker's private asymmetric key C. Baker's public asymmetric key
digital signature
a hash encrypted with the creator's private key
certificate authority
company that issues pairs of public and private keys and verifies the identity of the owner of those keys
key escrow
copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable
blockchain
distributed ledger of hashed documents
plaintext
document or file that can be read by anyone who accesses it
ciphertext
document or file that must be decrypted to be read
virtual private network (VPN)
encrypted tunnel used to transmit information securely across the Internet
asymmetric encryption
encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt
symmetric encryption
encryption process that uses the same key to both encrypt and decrypt
nonrepudiation
inability to unilaterally deny having created a document or file or having agreed to perform a transaction
data loss prevention (DLP)
procedure to filter outgoing traffic to prevent confidential information from leaving
hashing
process that transforms a document or file into a fixed-length string of data
nonce
random number used to validate a new block in a blockchain
data masking
replacing real data with fake data
digital watermark
secret mark used to identify proprietary information
information rights management (IRM)
software that limits what actions (read, copy, print, etc.) can be performed by users granted access to a file or document
digital certificate
used to store an entity's public key, often found on websites
The system used to issue pairs of asymmetric encryption keys and digital certificates is called a ___________.
A. VPN B. key escrow C. PKI D. tokenization or data masking C. PKI
Which of the following statements is true?
A. a file encrypted with X's private key can only be decrypted by using X's private key B. a file encrypted with X's private key can only be decrypted using X's public key C. a file encrypted with X's private key can only be decrypted by using Y's private key D. a file encrypted with X's private key can only be decrypted using Y's public key B. a file encrypted with X's private key can only be decrypted using X's public key
When is encryption LEAST effective in protecting the confidentiality of sensitive data?
A. at rest B. while it is being processed C. while it is transmitted over the Internet D. encryption is equally effective in protecting confidentiality at all stages of the data processing cycle. B. while it is being processed
Websites often provide a link to the organization's privacy policy. Doing so most directly satisfies the requirements of the section of GAPP referred to as____________
A. management B. notice C. quality D. collection B. notice
Which of the following is the most reliable way to acquire a company's public asymmetric key to be confident it really is owned by that company?
A. obtain it from a digital signature posted on that company's website B. obtain it directly from the company by means of an encrypted email C. obtain it from a valid digital certificate issued by a trusted certificate authority an posted on the company's website D. obtain it directly from the company via a USB delivered by a trusted delivery service (e.g., FedEx, UPS, or DHL) C. obtain it from a valid digital certificate issued by a trusted certificate authority an posted on the company's website
Which of the following factors increase the strength of an encryption solution?
A. securely storing encryption keys somewhere other than in the browser B. keeping the encryption algorithm secret C. using a 24-bit encryption key D. all three options increase the strength of an encryption solution E. none of the three factors increase the strength of an encryption solution A. securely storing encryption keys somewhere other than in the browser
To decrypt a digital signature, the recipient uses the __________.
A. sender's private key B. sender's public key C. recipient's private key D. recipient's public key B. sender's public key
Which of the following is the MOST IMPORTANT reason why it is virtually impossible for one entity in a blockchain network to unilaterally alter a document after it has been recorded and validated in a new block of transactions?
A. the use of a nonce to validate each block B. the existence of multiple copies of the blockchain on many different computers C. digital signatures D. digital certificate B. the existence of multiple copies of the blockchain on many different computers
GAPP stresses the importance of obtaining consent when collecting, using, and sharing information about customers. If a company's policy is to ask customers for permission to collect sensitive personal information and then only asks questions about sensitive matters (such as political beliefs or sexual orientation) after the customer agrees to answer such questions, it is following the process referred to as ____________.
A: explicit consent (opt-out) B: explicit consent (opt-in) C: implicit consent (opt-out) D: implicit consent (opt-in) B. explicit consent (opt-in)
