exam 1 ch. 1, 2,3

Is this your test? Login to manage it. If not, you can build an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
In public key encryption for authentication, the supplicant uses _____ to encrypt.
2.
1 point
Which companies do PCI-DSS affect?
3.
1 point
Cryptanalysts have found weaknesses in _____.
4.
1 point
What type of organizations is subject to FISMA?
5.
1 point
A(n) _______ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. (Choose the most specific choice)
6.
1 point
In a virus, the code that does damage is called the ______.
7.
1 point
Which of the following is NOT one of the three elements in the fraud and abuse triangle?
8.
1 point
SLE times APO gives the _______.
9.
1 point
The supplicant creates a digital signature by _______.
10.
1 point
Which type of program can hide itself from normal inspection and detection?
11.
1 point
A DES key is _____ bits long.
12.
1 point
________ specifically addresses data protection requirements at financial institutions.
13.
1 point
Which of the following are types of countermeasures?
14.
1 point
Hashing is ______.
15.
1 point
______ attacks take advantage of flawed human judgement by convincing the victim to take actions that are counter to security policies. (Choose the best answer)
16.
1 point
The ISO/IEC 2700 family focuses on ________.
17.
1 point
You receive an e-mail that seems to come from a frequent customer. It contains specific information about your relationship with the customer. Clicking on a link in the message takes you to a website to be your customer's website. However, the website is fake this is ______.
18.
1 point
In order to be considered strong today, a symmetric encryption key must be at least ______ bits long.
19.
1 point
In MS-CHAP, the _____ creates the response message.
20.
1 point
_______ is the security guarantee that people who intercept messages cannot read them.
21.
1 point
_______ examines IT processes for efficiency, effectiveness, and adequate controls.
22.
1 point
Which of the following fields are contained on a digital certificate?
23.
1 point
When Joshua sends a message to Larry, Joshua will use ____ to encrypt the message.
24.
1 point
The first step in developing an IT security plan is to _______.
25.
1 point
The three common core goals of security are _______.
26.
1 point
_______ are programs that attach themselves to legitimate programs.
27.
1 point
COSO focuses on _______.
28.
1 point
CobiT focuses on _______.
29.
1 point
The key to security being an enable is ______.
30.
1 point
Which of the following CIA security goals did TJX fail to meet?