81) ________ is a process which transforms data using mathematical formulas, so that no one can read the data unless they know the key to unscrambling.
A) Wear leveling
B) Write amplification
C) Decipherment
D) Encryption
82) Which of the following statements is true of encryption?
A) It is a powerful technical control that protects sensitive data.
B) It helps recover encoded files through an image processor even if the user forgets the password.
C) It allows application of notification laws when an organization loses sensitive information.
D) Encryption increases the level of risk assessments when it is used for backup data.
83) Which of the following is a feature of public key encryption?
A) uses a single point key to encrypt and decrypt data
B) uses a pair of keys, one to encrypt the data and the other to decrypt data
C) uses multiple number of keys accessible to all members of an organization
D) uses a duplication process to replicate keys
84) Which of the following technical controls helps secure information flow in an organization?
A) The information system enforces approved authorizations for access to the system.
B) The information system enforces the organization’s policy about human review.
C) The information system automatically disables accounts after a time period defined by the organization.
D) The information system defines the information to be encrypted or stored offline in a secure location.
85) Which of the following administrative control actions helps enforce access controls in an organization?
A) The organization requires appropriate approvals for requests to establish accounts.
B) The organization defines the security policy that determines what events require human review.
C) The organization defines the information to be encrypted or stored offline in a secure location.
D) The organization separates duties of individuals as necessary to prevent malevolent activity without collusion.
86) Which of the following is true of public key encryption?
A) The encryption formulas used for creating the keys are simple in nature and identical at both ends.
B) The encryption key is widely shared with everyone, while the decryption key is known only to the recipient.
C) The private key is used for encryption and is known only to the sender, while the public key is freely distributed among everyone and is used for decryption.
D) The public key encryption scheme uses a single key to encrypt data that can later be decrypted by using the encrypted data as the key.
87) A(n) ________ is a technical control that inspects a network’s incoming and outgoing traffic and either blocks or permits it according to rules the organization establishes.
A) botnet
B) Trojan horse
C) keylogger
D) firewall
88) Which of the following functions does a firewall perform?
A) It ensures security by using multiple authentication strategies for employees.
B) It attracts malicious attacks to study their properties and origins.
C) It defines which IP addresses or domain should be blocked.
D) It encodes sensitive data to ensure safe transmission across unsecured networks.
89) Which of the following systems are used to combat spam?
A) conversational programming systems
B) intrusion prevention systems
C) executive information systems
D) expert systems
90) What is a drawback of cloud computing?
A) It delivers computing as a product rather than a service.
B) It is difficult to keep track of data as employees can go mobile and take advantage of cloud services independently.
C) It is difficult to share resources because information is maintained on a protected server.
D) It provides computation that requires end-user knowledge of the physical location and configuration of the system that delivers services.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more