1 Identify a security objective that adds value to a business.
Confidentiality
Privacy
Integrity
Acess Control
Authorization
2 True or False: AES is an asymmetric encryption algorithm.
False
3 True or False: 3DES is an asymmetric encryption algorithm.
False
4 True or False: RSA is an asymmetric encryption algorithm.
True
5 True or False: RC4 is an asymmetric encryption algorithm.
False
6 Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature. nonrepudiation 7 True or False: Cipher text is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.
False
8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.
True
9 True or False: Access control is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.
False
10 True or False: Hashing is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.
False
11 What is the a cipher that shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A?
Caesar Cipher
12 Identify a security objective that stops authorization for access to data.
Revocation
13 True or False: Revocation is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
False
14 True or False: Authorization is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
False
15 True or False: Timestamping is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
False
16 True or False: Message authentication is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
False
17 In which type of cipher attack