Security Awareness - Unit 11 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is a risk associated with the use of private data? Constant use of encryption. Associations with groups. Malfunctioning hardware devices. Statistical anomalies.

Associations with groups.

Which of the following is an advantage of hardware encryption over software encryption? Software encryption is up to ten times slower than hardware encryption. There are no advantages of hardware encryption over software encryption. Hardware encryption is not subject to attacks like software encryption. Hardware encryption cannot be used on older computers.

Hardware encryption is not subject to attacks like software encryption.

Which of the following is a legitimate responsibility of an organization regarding user private data? Keep personal information indefinitely. Limit administrative access to personal information. Use proprietary methods for data collection to maintain security. Collect all user personal information.

Limit administrative access to personal information.

Which of the following can be described as data that is used to describe the content or structure of the actual data? Metadata Cleartext Ciphertext Encrypted data

Metadata

Which of the following is NOT true regarding how individuals are concerned about how their private data is being used? It would be very difficult to remove inaccurate information about them online Their personal information is no more at risk today than it was 10 years ago. The government may access some of the information they share on social networking sites without their knowledge. Consumers have lost control over how personal information is collected and used by companies.

Their personal information is no more at risk today than it was 10 years ago.

If the URL of a web site begins with https, the server is using a digital certificate to verify the existence and identity of the organization. True False

True

Which of these is a characteristic of a secure hash algorithm? Two different sets of data cannot produce the same digest The results of a hash function should be reversible A digest of a short set and a long set of data should produce different sizes It should be possible to produce a data set that has a desired or predefined hash

Two different sets of data cannot produce the same digest

A digital signature can provide which of the following benefits? data integrity data availability data encryption data redundancy

data integrity

Which type of cryptography creates a value that is primarily used for comparison purposes? symmetric cryptography asymmetric cryptography public key encryption hashing

hashing

Which of the following is a place where steganography can hide data? in the hard disk master boot record in the metadata of a file in the file allocation table in the directory structure of the file system

in the metadata of a file

Proving that a document was created by a particular user is referred to as which of the following? availability integrity repudiation nonrepudiation

nonrepudiation

What is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data? opentext cleartext plaintext ciphertext

plaintext


Set pelajaran terkait

Family and Consumer Science Praxis

View Set

A Gathering Of Old Men, huge thanks to whoever answered!

View Set

BUS 204 Ch. 1 Law and Legal Reasoning

View Set

Welcome to Section 4, Unit 5: Agent Duties in Georgia

View Set