Cybersecurity

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Answer: Authentication

14. _________________ provides proof of the genuineness of the user.

Answer: a. steganography

20. A process that divides data into smaller sections and hides it in unused portions of a file is known as which of the following?

Answer: b. userC's public key

If userA sends a secure message to userB using an asymmetric cryptographic algorithm, and userB sends a reply, what key is used if userA wants another user, userC to read the reply message?

c. Hash algorithm

Which of the following is NOT an element of asymmetric cryptography?

Answer: b. hashing

Which type of cryptography creates a value that is primarily used for comparison purposes?

Answer: Metadata

13. ________________ is data that is used to describe the content or structure of the actual data in a file

True

(True/False) The Likes indicated by Facebook users can statistically reveal their sexual orientation, drug use, and political beliefs.

Answer: a. True

1. (True/False) If the URL of a web site begins with https, the server is using a digital certificate to verify the existence and identity of the organization.

c. their personal information is no more at risk today than it was 10 years ago.

12. Which of the following is NOT true regarding how individuals are concerned how their private data is being used?

Answer: b. integrity

15. Which of the five basic protections provided by cryptography ensures that information is correct and no unauthorized person or malicious software has altered that data?

Answer: public key

16. An asymmetric encryption key that does not have to be protected is called ___________________.

Answer: clear text

17. _______________ is the name given to data that is in an unencrypted form.

Answer: Key

18. A ____________ is a mathematical value entered into a cryptographic algorithm to produce encrypted data

Answer: d. data broker

19. Which of the following terms best describe a person or organization that sells data to interested third parties?

Answer: a. One

4. How many keys are used in symmetric cryptography?

Answer: b. Privacy of any level that you desire is easily achievable today.

5. Which of the following is NOT true about privacy?

Answer: d. Public key cryptography

6. What is another name for asymmetric cryptography?

Answer: b. Two different sets of data cannot produce the same digest

7. Which of these is a characteristic of a secure hash algorithm?

Answer: a. redundancy

8. Which of the following is NOT a protection for information that cryptography can provide?

Answer: c. associations with groups

9. Which of the following is a risk associated with the use of private data?


संबंधित स्टडी सेट्स

Ch. 4 Prenatal Development and Birth

View Set