AIS Chapter 12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Able wants to send an encrypted document to Baker as an email attachment. If Able wants to securely send Baker the key to decrypt the document, Able should encrypt the key using ___________.

A. Able's public asymmetric key B. Able's private asymmetric key C. Baker's public asymmetric key D. Baker's private asymmetric key C. Baker's public asymmetric key

digital signature

a hash encrypted with the creator's private key

certificate authority

company that issues pairs of public and private keys and verifies the identity of the owner of those keys

key escrow

copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable

blockchain

distributed ledger of hashed documents

plaintext

document or file that can be read by anyone who accesses it

ciphertext

document or file that must be decrypted to be read

virtual private network (VPN)

encrypted tunnel used to transmit information securely across the Internet

asymmetric encryption

encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt

symmetric encryption

encryption process that uses the same key to both encrypt and decrypt

nonrepudiation

inability to unilaterally deny having created a document or file or having agreed to perform a transaction

data loss prevention (DLP)

procedure to filter outgoing traffic to prevent confidential information from leaving

hashing

process that transforms a document or file into a fixed-length string of data

nonce

random number used to validate a new block in a blockchain

data masking

replacing real data with fake data

digital watermark

secret mark used to identify proprietary information

information rights management (IRM)

software that limits what actions (read, copy, print, etc.) can be performed by users granted access to a file or document

digital certificate

used to store an entity's public key, often found on websites

The system used to issue pairs of asymmetric encryption keys and digital certificates is called a ___________.

A. VPN B. key escrow C. PKI D. tokenization or data masking C. PKI

Which of the following statements is true?

A. a file encrypted with X's private key can only be decrypted by using X's private key B. a file encrypted with X's private key can only be decrypted using X's public key C. a file encrypted with X's private key can only be decrypted by using Y's private key D. a file encrypted with X's private key can only be decrypted using Y's public key B. a file encrypted with X's private key can only be decrypted using X's public key

When is encryption LEAST effective in protecting the confidentiality of sensitive data?

A. at rest B. while it is being processed C. while it is transmitted over the Internet D. encryption is equally effective in protecting confidentiality at all stages of the data processing cycle. B. while it is being processed

Websites often provide a link to the organization's privacy policy. Doing so most directly satisfies the requirements of the section of GAPP referred to as____________

A. management B. notice C. quality D. collection B. notice

Which of the following is the most reliable way to acquire a company's public asymmetric key to be confident it really is owned by that company?

A. obtain it from a digital signature posted on that company's website B. obtain it directly from the company by means of an encrypted email C. obtain it from a valid digital certificate issued by a trusted certificate authority an posted on the company's website D. obtain it directly from the company via a USB delivered by a trusted delivery service (e.g., FedEx, UPS, or DHL) C. obtain it from a valid digital certificate issued by a trusted certificate authority an posted on the company's website

Which of the following factors increase the strength of an encryption solution?

A. securely storing encryption keys somewhere other than in the browser B. keeping the encryption algorithm secret C. using a 24-bit encryption key D. all three options increase the strength of an encryption solution E. none of the three factors increase the strength of an encryption solution A. securely storing encryption keys somewhere other than in the browser

To decrypt a digital signature, the recipient uses the __________.

A. sender's private key B. sender's public key C. recipient's private key D. recipient's public key B. sender's public key

Which of the following is the MOST IMPORTANT reason why it is virtually impossible for one entity in a blockchain network to unilaterally alter a document after it has been recorded and validated in a new block of transactions?

A. the use of a nonce to validate each block B. the existence of multiple copies of the blockchain on many different computers C. digital signatures D. digital certificate B. the existence of multiple copies of the blockchain on many different computers

GAPP stresses the importance of obtaining consent when collecting, using, and sharing information about customers. If a company's policy is to ask customers for permission to collect sensitive personal information and then only asks questions about sensitive matters (such as political beliefs or sexual orientation) after the customer agrees to answer such questions, it is following the process referred to as ____________.

A: explicit consent (opt-out) B: explicit consent (opt-in) C: implicit consent (opt-out) D: implicit consent (opt-in) B. explicit consent (opt-in)


संबंधित स्टडी सेट्स

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide - Chapter 1

View Set

MS DMV Driving Test, Mississippi Permit Practice Test (1)

View Set

Which prefix meaning "into": in-, im-, or ir- ?

View Set

Osteology: Appendicular Skeleton Upper Limbs

View Set

Reading Comprehension Strategies 2: dissecting paragraphs, common phrasing for incorrect answers, traps

View Set

CH 11 & 12 Managing Individual Differences & Behavior/Motivating Employees

View Set

Types of strength training Exercises

View Set

Life Insurance and Health Insurance

View Set