CSIA 300 Final Prep | 100% Correct Answers | Verified | Latest 2024 Version
Which of the following phases of a system development life-cycle is most concerned with authenticating users and processes to ensure appropriate access control decisions? - Operation and maintenance What is the effective key size of DES? - 56 bit What are two types of ciphers? - Transposition and substitution When block chaining cryptography is used, what type of code is calculated and appended to the data to ensure authenticity? - Message authentication code Which of the following is the most secure form of triple-DES encryption? - DES-EDE3 Cryptography does not help in - Detecting fraudulent disclosure All of the following statements about a security incident plan are correct EXCEPT - The plan should be published annually Two separate employees are required to open a safe containing sensitive information. One employee has part of the safe combination, and a second employee has another part of the safe combination. This arrangement follows the principle of - Split custody Within the realm of IT security, which of the following combinations best defines risk? - Threat coupled with a vulnerability
Written for
- Institution
- CSIA 300
- Module
- CSIA 300
Document information
- Uploaded on
- March 8, 2024
- Number of pages
- 26
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
csia 300 final prep 100 correct answers verif
Also available in package deal