Cyber security quiz 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

Diffie-Hellman

What protocol is responsible for assigning IP addresses to host on most networks

Dynamic host configuration protocol (DHCP)

You must always use the same algorithm to encrypt information and decrypt the same information

False

Violet deploys an intrusion prevention system (IPS) on her network as a security control. What type of control has violet deployed ?

Preventive

Which approach to cryptography provides the strongest theoretical protection

Quantum cryptography

Alan is the security manager for a midsize business. The company has suffered several series data losses when mobile devices were stolen. Allen decides to implement full disk encryption on all mobile devices. What risk response did Alan take

Reduce

Purchasing insurance insurance policy is an example of____ risk management strategy

Transfer

Business Impact Analysis (BIA) details The steps to recover from a disruption and restore the infrastructure necessary for normal business operations

True

Distance learning is another term for online study

True

What type of network connect systems over the largest geographic area

WAN

Which information security objective allows trusted entities to endorse information

certification

Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?

decryption

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?

integrity

Which type of cipher works by rearranging the characters in the message

transposition


Set pelajaran terkait

Missouri Statutes, Rules, and Regulations Pertinent to Life Only / Health Only

View Set

Intro to IT Fundamentals FC0-U61

View Set

Biology - Chapter 24 - Sustainability

View Set

World History II Unit IV - Ch 24

View Set