CSIA 300 Final Prep | 100% Correct Answers | Verified | Latest 2024 Version
Which of the following phases of a system development life-cycle is most concerned with authenticating users and processes to ensure appropriate access control decisions? - Operation and maintenance What is the effective key size of DES? - 56 bit What are two types of ciphers? - Transposition and substitution When block chaining cryptography is used, what type of code is calculated and appended to the data to ensure authenticity? - Message authentication code Which of the following is the most secure form of triple-DES encryption? - DES-EDE3 Cryptography does not help in - Detecting fraudulent disclosure All of the following statements about a security incident plan are correct EXCEPT - The plan should be published annually Two separate employees are required to open a safe containing sensitive information. One employee has part of the safe combination, and a second employee has another part of the safe combination. This arrangement follows the principle of - Split custody Within the realm of IT security, which of the following combinations best defines risk? - Threat coupled with a vulnerability
Geschreven voor
- Instelling
- CSIA 300
- Vak
- CSIA 300
Documentinformatie
- Geüpload op
- 8 maart 2024
- Aantal pagina's
- 26
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
csia 300 final prep 100 correct answers verif
Ook beschikbaar in voordeelbundel