Question: Answer all multiple choice problems (each question carries 2 points) assures that individuals control or influence what information related to them may be collected and
Answer all multiple choice problems (each question carries 2 points) assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed A. Availability B. Privacy C. System Integrity D. Data Integrity 2. inadvertent unauthorized manipulation of the system. assures that a system performs its intended function in an unimpaired manner, free from deliberate or A. System Integrity B. Availability C. Data Integrity D. Confidentiality 3. A loss of is the unauthorized disclosure of information A. confidentiality B. authenticity C. integrity D. availability 4. The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the A. SHA C. AES B. RSA D. DSS 5. If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to . A. use longer keys C. use more keys B. use shorter keys D. use less keys is a procedure that allows communicating parties to verify that received or stored messages are 6. authentic. A. Cryptanalysis C. Message authentication B. Decryption D. Collision resistance 7 The most common means of human-to-human identification are A. facial characteristics B. retinal patterns C. signatures D. fingerprints systems identify features of the hand, including shape, and lengths and widths of fingers. A. Signature B. Fingerprint C. Hand geometry D. Palm print 8. in the system. C. authenticated D. enrolled 9. Each individual who is to be included in the database of authorized users must first be A. verified B. identified
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
