A) Public key encryption uses two mathematically related digital keys.
B) Public key encryption ensures authentication of the sender.
C) Public key encryption does not ensure message integrity.
D) Public key encryption is based on the idea of irreversible mathematical functions.
Correct Answer
verified
Multiple Choice
A) In symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message.
B) The Data Encryption Standard is a symmetric key encryption system.
C) Symmetric key encryption is computationally slower.
D) Symmetric key encryption is a key element in digital envelopes.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Debit cards eliminate the need for consumers to write a paper check when making a purchase.
B) Debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of purchase.
C) Debit cards do not provide any float.
D) Debit cards do not have the protections provided by Regulation Z to credit cards.
Correct Answer
verified
Short Answer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) smart cards.
B) credit cards.
C) gift certificates.
D) prepaid cards.
Correct Answer
verified
Multiple Choice
A) The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C) PKI guarantees that the verifying computer of the merchant is secure.
D) The acronym PKI stands for public key infrastructure.
Correct Answer
verified
Multiple Choice
A) DES
B) NFC
C) IM
D) text messaging
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) the client computer
B) the server
C) the communications pipeline
D) the credit card companies
Correct Answer
verified
Multiple Choice
A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.
Correct Answer
verified
Multiple Choice
A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks
Correct Answer
verified
Multiple Choice
A) Perform a security audit.
B) Develop an implementation plan.
C) Create a security organization.
D) Develop a security policy.
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) SSL/TLS.
B) certificates.
C) VPN.
D) FTP.
Correct Answer
verified
Multiple Choice
A) envelope.
B) signature.
C) certificate.
D) hash.
Correct Answer
verified
Showing 1 - 20 of 86
Related Exams