Which of the following statements are true about Public-key cryptography?
Which of the following statements are true about Public-key cryptography? Each correct answer
represents a complete solution. Choose two.
What is the most cost effective method to prevent this?
You are the Network Administrator for a college. You watch a large number of people (some not
even students) going in and out of areas with campus computers (libraries, computer labs, etc.).
You have had a problem with laptops being stolen. What is the most cost effective method to
prevent this?
Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level
FIPS 199 defines the three levels of potential impact on organizations low, moderate, and high.
Which of the following are the effects of loss of confidentiality, integrity, or availability in a high
level potential impact
Which of the following backup types backs up files that have been added and all data that have been modified s
Which of the following backup types backs up files that have been added and all data that have
been modified since the most recent backup was performed?
Which of the following is violated in a shoulder surfing attack?
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the
premises of an organization. This attack is often performed by looking surreptitiously at the
keyboard of an employee’s computer while he is typing in his password at any access point such
as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?
Choose all that apply
Which of the following individuals are part of the senior management and are responsible for
authorization of individual systems, approving enterprise solutions, establishing security policies,
providing funds, and maintaining an understanding of risks at all levels Each correct answer
represents a complete solution. Choose all that apply.
What would best solve this problem?
You are responsible for security at a hospital. Since many computers are accessed by multiple
employees 24 hours a day, 7 days a week, controlling physical access to computers is very
difficult. This is compounded by a high number of non employees moving through the building.
You are concerned about unauthorized access to patient records. What would best solve this
problem?
Which of the following plans provides procedures for recovering business operations immediately following a di
Which of the following plans provides procedures for recovering business operations immediately
following a disaster?
Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other t
Which of the following laws is the first to implement penalties for the creator of viruses, worms,
and other types of malicious code that causes harm to the computer systems
which of the following cryptographic attacking techniques does the attacker pick up the information to be encr
In which of the following cryptographic attacking techniques does the attacker pick up the
information to be encrypted and take a copy of it with the encrypted data?