Exam 9: Information Systems Controls for Systems Reliability Part 2: Confidentiality and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of

(Multiple Choice)
4.9/5
(36)

Which of the following is not one of the three important factors determining the strength of any encryption system?

(Multiple Choice)
4.7/5
(44)

Encryption has a remarkably long and varied history.The invention of writing was apparently soon followed by a desire to conceal messages.One of the earliest methods,attributed to an ancient Roman emperor,was the simple substitution of numbers for letters,for example A = 1,B = 2,etc.This is an example of

(Multiple Choice)
4.7/5
(35)

In a private key system the sender and the receiver have ________,and in the public key system they have ________.

(Multiple Choice)
4.9/5
(30)
Showing 21 - 24 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)