Question 1 (1 point) Saved Which of the following is used to associate a public key with an identity? Question 1 options: Digital hash Digital certificate Digital signature Encryption Question 2 (1 point) Saved Which of the following statements about asymmetric key cryptography is true? Question 2 options: Asymmetric key cryptography is also called private key cryptography. Asymmetric key cryptography uses one shared key. Asymmetric key cryptography is also called public key cryptography. Asymmetric key cryptography uses two keys called public keys. Question 3 (1 point) Saved Which of the following issues and maintains digital certificates? Question 3 options: Registration authority Certification authority Public key infrastructure Client nodes Question 4 (1 point) Saved Which of the following tasks is part of the disposal phase of the SDLC? Question 4 options: Adding hardware and software Authorization Archiving information and sanitization of media Conducting risk assessment Question 5 (1 point) Saved Identification of compliance requirements is done during which of the following phases of the SDLC? Question 5 options: Development/acquisition Implementation/assessment Initiation Operations/maintenance Question 6 (1 point) Which of the following is the most common web application security flaw? Question 6 options: Static data validation Dynamic data validation Failure to validate output Failure to validate input Question 7 (1 point) Saved Which of the following is one of the most popular symmetric algorithms of recent years? Question 7 options: DES AES IPsec RSA Question 8 (1 point) Saved Which of the following statements about symmetric key cryptography is not true? Question 8 options: Symmetric key cryptography uses one shared key. Symmetric algorithms can provide confidentiality. Symmetric key cryptography uses a single secret key. Symmetric algorithms can provide nonrepudiation and authenticity. Question 9 (1 point) Saved Which of the following is the process of creating a numeric value that represents the original text? Question 9 options: Encryption Decryption Hashing Key management Question 10 (1 point) Saved Which of the following provides confidentiality? Question 10 options: Key management Decryption Encryption Hashing Question 11 (1 point) Public key cryptography uses which of the following? Question 11 options: A private key A public key Both a public and a private key A shared key Question 12 (1 point) Which of the following provides a standardized process for all phases of any system development or acquisition effort? Question 12 options: NIST SDLC CIA COTS Question 13 (1 point) Which of the following is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted? Question 13 options: GLBA MITRE NIST OWASP Question 14 (1 point) Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations r.