SlideShare a Scribd company logo
Question 1 (1 point)
Saved
Which of the following is used to associate a public key with an identity?
Question 1 options:
Digital hash
Digital certificate
Digital signature
Encryption
Question 2 (1 point)
Saved
Which of the following statements about asymmetric key cryptography is true?
Question 2 options:
Asymmetric key cryptography is also called private key cryptography.
Asymmetric key cryptography uses one shared key.
Asymmetric key cryptography is also called public key cryptography.
Asymmetric key cryptography uses two keys called public keys.
Question 3 (1 point)
Saved
Which of the following issues and maintains digital certificates?
Question 3 options:
Registration authority
Certification authority
Public key infrastructure
Client nodes
Question 4 (1 point)
Saved
Which of the following tasks is part of the disposal phase of the SDLC?
Question 4 options:
Adding hardware and software
Authorization
Archiving information and sanitization of media
Conducting risk assessment
Question 5 (1 point)
Saved
Identification of compliance requirements is done during which of the following phases of the
SDLC?
Question 5 options:
Development/acquisition
Implementation/assessment
Initiation
Operations/maintenance
Question 6 (1 point)
Which of the following is the most common web application security flaw?
Question 6 options:
Static data validation
Dynamic data validation
Failure to validate output
Failure to validate input
Question 7 (1 point)
Saved
Which of the following is one of the most popular symmetric algorithms of recent years?
Question 7 options:
DES
AES
IPsec
RSA
Question 8 (1 point)
Saved
Which of the following statements about symmetric key cryptography is not true?
Question 8 options:
Symmetric key cryptography uses one shared key.
Symmetric algorithms can provide confidentiality.
Symmetric key cryptography uses a single secret key.
Symmetric algorithms can provide nonrepudiation and authenticity.
Question 9 (1 point)
Saved
Which of the following is the process of creating a numeric value that represents the original
text?
Question 9 options:
Encryption
Decryption
Hashing
Key management
Question 10 (1 point)
Saved
Which of the following provides confidentiality?
Question 10 options:
Key management
Decryption
Encryption
Hashing
Question 11 (1 point)
Public key cryptography uses which of the following?
Question 11 options:
A private key
A public key
Both a public and a private key
A shared key
Question 12 (1 point)
Which of the following provides a standardized process for all phases of any system
development or acquisition effort?
Question 12 options:
NIST
SDLC
CIA
COTS
Question 13 (1 point)
Which of the following is an open community dedicated to enabling organizations to develop,
purchase, and maintain applications that can be trusted?
Question 13 options:
GLBA
MITRE
NIST
OWASP
Question 14 (1 point)
Which of the following components of PKI performs the administrative functions, including
verifying the identity of users and organizations requesting a digital certificate?
Question 14 options:
Client nodes
Digital certificate
Certification authority
Registration authority
Question 15 (1 point)
Which of the following is not a best practice for cryptographic key management?
Question 15 options:
Keys should be properly destroyed when their lifetime ends.
Keys should be transmitted and stored by secure means.
Key values should be random, and the full spectrum of the keyspace should be used.
Keys should be presented in clear text.
Digital hash
Digital certificate
Digital signature
Encryption

More Related Content

Similar to Question 1 (1 point)SavedWhich of the following is used to ass.pdf

272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
tamicawaysmith
 
CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   
bellflower45
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
Adeel Javaid
 
CIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.comCIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.com
bellflower85
 
CMIT 321 QUIZ 3
CMIT 321 QUIZ 3CMIT 321 QUIZ 3
CMIT 321 QUIZ 3
HamesKellor
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
Mayank Sachan
 
Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com  Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com
amaranthbeg146
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdf
john485745
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
Shujun Li
 
CMIT 321 WEEK 2 QUIZ
CMIT 321 WEEK 2 QUIZCMIT 321 WEEK 2 QUIZ
CMIT 321 WEEK 2 QUIZ
HamesKellor
 
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.com
Baileya82
 
[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles
OWASP
 
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKSSURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
IJNSA Journal
 
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
FRSecure
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
Alan Tatourian
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
David Shepherd
 
Task 1In this module, you learned that random numbers (or, .docx
Task 1In this module, you learned that random numbers (or, .docxTask 1In this module, you learned that random numbers (or, .docx
Task 1In this module, you learned that random numbers (or, .docx
josies1
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
Mark Curphey
 

Similar to Question 1 (1 point)SavedWhich of the following is used to ass.pdf (20)

272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
 
CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
CIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.comCIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.com
 
CMIT 321 QUIZ 3
CMIT 321 QUIZ 3CMIT 321 QUIZ 3
CMIT 321 QUIZ 3
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 
Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com  Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdf
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
CMIT 321 WEEK 2 QUIZ
CMIT 321 WEEK 2 QUIZCMIT 321 WEEK 2 QUIZ
CMIT 321 WEEK 2 QUIZ
 
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.com
 
[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles
 
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKSSURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
 
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Task 1In this module, you learned that random numbers (or, .docx
Task 1In this module, you learned that random numbers (or, .docxTask 1In this module, you learned that random numbers (or, .docx
Task 1In this module, you learned that random numbers (or, .docx
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 

More from sunilkhetpal

Question 3 Your bank has the following balance sheet Assets .pdf
Question 3 Your bank has the following balance sheet Assets     .pdfQuestion 3 Your bank has the following balance sheet Assets     .pdf
Question 3 Your bank has the following balance sheet Assets .pdf
sunilkhetpal
 
Question 3 [12]A large share of the growing expenditure in South.pdf
Question 3 [12]A large share of the growing expenditure in South.pdfQuestion 3 [12]A large share of the growing expenditure in South.pdf
Question 3 [12]A large share of the growing expenditure in South.pdf
sunilkhetpal
 
Question 26 optionsThe (blank)was used an example of a cartel.pdf
Question 26 optionsThe (blank)was used an example of a cartel.pdfQuestion 26 optionsThe (blank)was used an example of a cartel.pdf
Question 26 optionsThe (blank)was used an example of a cartel.pdf
sunilkhetpal
 
Question 2.Question 3.Question 4.Question 5. Which of the foll.pdf
Question 2.Question 3.Question 4.Question 5. Which of the foll.pdfQuestion 2.Question 3.Question 4.Question 5. Which of the foll.pdf
Question 2.Question 3.Question 4.Question 5. Which of the foll.pdf
sunilkhetpal
 
Question 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdf
Question 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdfQuestion 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdf
Question 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdf
sunilkhetpal
 
Question 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdf
Question 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdfQuestion 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdf
Question 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdf
sunilkhetpal
 
QUESTION 1 PURPOSE Manage expectations and communication across mul.pdf
QUESTION 1 PURPOSE Manage expectations and communication across mul.pdfQUESTION 1 PURPOSE Manage expectations and communication across mul.pdf
QUESTION 1 PURPOSE Manage expectations and communication across mul.pdf
sunilkhetpal
 
Question 1 Explain the difference between management and leadership.pdf
Question 1 Explain the difference between management and leadership.pdfQuestion 1 Explain the difference between management and leadership.pdf
Question 1 Explain the difference between management and leadership.pdf
sunilkhetpal
 
Quer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdf
Quer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdfQuer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdf
Quer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdf
sunilkhetpal
 
Question 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdf
Question 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdfQuestion 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdf
Question 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdf
sunilkhetpal
 
Questa Bank is intending to invest in two different investments with.pdf
Questa Bank is intending to invest in two different investments with.pdfQuesta Bank is intending to invest in two different investments with.pdf
Questa Bank is intending to invest in two different investments with.pdf
sunilkhetpal
 
Question 1Write a detailed technical report of 5000 words. The au.pdf
Question 1Write a detailed technical report of 5000 words. The au.pdfQuestion 1Write a detailed technical report of 5000 words. The au.pdf
Question 1Write a detailed technical report of 5000 words. The au.pdf
sunilkhetpal
 
Reference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdf
Reference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdfReference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdf
Reference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdf
sunilkhetpal
 
Record-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdf
Record-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdfRecord-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdf
Record-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdf
sunilkhetpal
 
Realice pruebas t de muestras independientes en las puntuaciones de .pdf
Realice pruebas t de muestras independientes en las puntuaciones de .pdfRealice pruebas t de muestras independientes en las puntuaciones de .pdf
Realice pruebas t de muestras independientes en las puntuaciones de .pdf
sunilkhetpal
 
Reading the Discussion section, answer the following (5 marks)a .pdf
Reading the Discussion section, answer the following (5 marks)a .pdfReading the Discussion section, answer the following (5 marks)a .pdf
Reading the Discussion section, answer the following (5 marks)a .pdf
sunilkhetpal
 
Rebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdf
Rebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdfRebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdf
Rebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdf
sunilkhetpal
 
Read the case study given below and answer ALL the questions. What w.pdf
Read the case study given below and answer ALL the questions. What w.pdfRead the case study given below and answer ALL the questions. What w.pdf
Read the case study given below and answer ALL the questions. What w.pdf
sunilkhetpal
 
QUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdf
QUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdfQUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdf
QUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdf
sunilkhetpal
 
Read case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdf
Read case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdfRead case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdf
Read case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdf
sunilkhetpal
 

More from sunilkhetpal (20)

Question 3 Your bank has the following balance sheet Assets .pdf
Question 3 Your bank has the following balance sheet Assets     .pdfQuestion 3 Your bank has the following balance sheet Assets     .pdf
Question 3 Your bank has the following balance sheet Assets .pdf
 
Question 3 [12]A large share of the growing expenditure in South.pdf
Question 3 [12]A large share of the growing expenditure in South.pdfQuestion 3 [12]A large share of the growing expenditure in South.pdf
Question 3 [12]A large share of the growing expenditure in South.pdf
 
Question 26 optionsThe (blank)was used an example of a cartel.pdf
Question 26 optionsThe (blank)was used an example of a cartel.pdfQuestion 26 optionsThe (blank)was used an example of a cartel.pdf
Question 26 optionsThe (blank)was used an example of a cartel.pdf
 
Question 2.Question 3.Question 4.Question 5. Which of the foll.pdf
Question 2.Question 3.Question 4.Question 5. Which of the foll.pdfQuestion 2.Question 3.Question 4.Question 5. Which of the foll.pdf
Question 2.Question 3.Question 4.Question 5. Which of the foll.pdf
 
Question 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdf
Question 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdfQuestion 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdf
Question 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdf
 
Question 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdf
Question 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdfQuestion 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdf
Question 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdf
 
QUESTION 1 PURPOSE Manage expectations and communication across mul.pdf
QUESTION 1 PURPOSE Manage expectations and communication across mul.pdfQUESTION 1 PURPOSE Manage expectations and communication across mul.pdf
QUESTION 1 PURPOSE Manage expectations and communication across mul.pdf
 
Question 1 Explain the difference between management and leadership.pdf
Question 1 Explain the difference between management and leadership.pdfQuestion 1 Explain the difference between management and leadership.pdf
Question 1 Explain the difference between management and leadership.pdf
 
Quer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdf
Quer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdfQuer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdf
Quer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdf
 
Question 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdf
Question 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdfQuestion 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdf
Question 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdf
 
Questa Bank is intending to invest in two different investments with.pdf
Questa Bank is intending to invest in two different investments with.pdfQuesta Bank is intending to invest in two different investments with.pdf
Questa Bank is intending to invest in two different investments with.pdf
 
Question 1Write a detailed technical report of 5000 words. The au.pdf
Question 1Write a detailed technical report of 5000 words. The au.pdfQuestion 1Write a detailed technical report of 5000 words. The au.pdf
Question 1Write a detailed technical report of 5000 words. The au.pdf
 
Reference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdf
Reference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdfReference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdf
Reference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdf
 
Record-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdf
Record-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdfRecord-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdf
Record-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdf
 
Realice pruebas t de muestras independientes en las puntuaciones de .pdf
Realice pruebas t de muestras independientes en las puntuaciones de .pdfRealice pruebas t de muestras independientes en las puntuaciones de .pdf
Realice pruebas t de muestras independientes en las puntuaciones de .pdf
 
Reading the Discussion section, answer the following (5 marks)a .pdf
Reading the Discussion section, answer the following (5 marks)a .pdfReading the Discussion section, answer the following (5 marks)a .pdf
Reading the Discussion section, answer the following (5 marks)a .pdf
 
Rebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdf
Rebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdfRebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdf
Rebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdf
 
Read the case study given below and answer ALL the questions. What w.pdf
Read the case study given below and answer ALL the questions. What w.pdfRead the case study given below and answer ALL the questions. What w.pdf
Read the case study given below and answer ALL the questions. What w.pdf
 
QUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdf
QUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdfQUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdf
QUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdf
 
Read case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdf
Read case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdfRead case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdf
Read case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdf
 

Recently uploaded

DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 

Recently uploaded (20)

DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 

Question 1 (1 point)SavedWhich of the following is used to ass.pdf

  • 1. Question 1 (1 point) Saved Which of the following is used to associate a public key with an identity? Question 1 options: Digital hash Digital certificate Digital signature Encryption Question 2 (1 point) Saved Which of the following statements about asymmetric key cryptography is true? Question 2 options: Asymmetric key cryptography is also called private key cryptography. Asymmetric key cryptography uses one shared key.
  • 2. Asymmetric key cryptography is also called public key cryptography. Asymmetric key cryptography uses two keys called public keys. Question 3 (1 point) Saved Which of the following issues and maintains digital certificates? Question 3 options: Registration authority Certification authority Public key infrastructure Client nodes Question 4 (1 point) Saved Which of the following tasks is part of the disposal phase of the SDLC? Question 4 options: Adding hardware and software
  • 3. Authorization Archiving information and sanitization of media Conducting risk assessment Question 5 (1 point) Saved Identification of compliance requirements is done during which of the following phases of the SDLC? Question 5 options: Development/acquisition Implementation/assessment Initiation Operations/maintenance Question 6 (1 point)
  • 4. Which of the following is the most common web application security flaw? Question 6 options: Static data validation Dynamic data validation Failure to validate output Failure to validate input Question 7 (1 point) Saved Which of the following is one of the most popular symmetric algorithms of recent years? Question 7 options: DES AES IPsec
  • 5. RSA Question 8 (1 point) Saved Which of the following statements about symmetric key cryptography is not true? Question 8 options: Symmetric key cryptography uses one shared key. Symmetric algorithms can provide confidentiality. Symmetric key cryptography uses a single secret key. Symmetric algorithms can provide nonrepudiation and authenticity. Question 9 (1 point) Saved Which of the following is the process of creating a numeric value that represents the original text? Question 9 options: Encryption
  • 6. Decryption Hashing Key management Question 10 (1 point) Saved Which of the following provides confidentiality? Question 10 options: Key management Decryption Encryption Hashing Question 11 (1 point) Public key cryptography uses which of the following? Question 11 options:
  • 7. A private key A public key Both a public and a private key A shared key Question 12 (1 point) Which of the following provides a standardized process for all phases of any system development or acquisition effort? Question 12 options: NIST SDLC CIA COTS
  • 8. Question 13 (1 point) Which of the following is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted? Question 13 options: GLBA MITRE NIST OWASP Question 14 (1 point) Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate? Question 14 options: Client nodes Digital certificate
  • 9. Certification authority Registration authority Question 15 (1 point) Which of the following is not a best practice for cryptographic key management? Question 15 options: Keys should be properly destroyed when their lifetime ends. Keys should be transmitted and stored by secure means. Key values should be random, and the full spectrum of the keyspace should be used. Keys should be presented in clear text. Digital hash Digital certificate