Exam Questions and Answers 100%
Pass
Symmetric encryption - ✔✔Used to conceal the contents of blocks or stream of data of
any size, including messages, files, encryption keys, and passwords
Asymmetric encryption - ✔✔Used to conceal small blocks of data, such as encryption
keys and hash function values, which are used in digital signatures
Data integrity algorithms - ✔✔Used to protect blocks of data from alteration
Authentication protocols - ✔✔Schemes based on the use of cryptographic designed to
authenticate the identity of entities
The Internet and security field consist of - ✔✔Measures to deter, prevent, detect, and
correct security violations that involve the transmission of information
NIST - ✔✔National institute of standards and technology
100% Pass Guarantee Sophia Bennett, All Rights Reserved © 2025 1
, Computer security - ✔✔The protection afforded to an automated information system in
order to attain the applicable objectives of preserving the integrity, availability and
confidentiality of information system resources
Confidentiality types - ✔✔1- Data confidentiality
2- Privacy
Data confidentiality - ✔✔Assures that private or confidential information is not made
available or disclosed to unauthorized individuals
Privacy - ✔✔Assures that individuals control or influence what related to them may be
collected and stored and by whom and to whom information may be disclosed
Integrity - ✔✔1- data integrity
2- system integrity
Data integrity - ✔✔Assures that information and programs are changed only in a
specified and authorized manner
System integrity - ✔✔Assures that a system performs it's intended function in
unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of
system
Availability - ✔✔Assures that systems work promptly and service is not denied to
authorized users
100% Pass Guarantee Sophia Bennett, All Rights Reserved © 2025 2