Multiple Choice
Encryption is the process of _____.
A) rendering information unreadable in such a way that authorized users may later make the information readable
B) adding a password to information
C) placing information behind a firewall
D) placing information in the de-militarized zone
Correct Answer:

Verified
Correct Answer:
Verified
Q4: Most commercial encryption technologies such as SSL
Q5: Authorization is _.<br>A)hiding information<br>B)providing an alternate identity<br>C)the
Q6: Vulnerabilities are _.<br>A)weaknesses in an information system
Q7: Confidentiality is defined as _.<br>A)guarding against improper
Q8: Authentication is _.<br>A)hiding information<br>B)providing an alternate identity<br>C)the
Q10: All the following are properties of asymmetric
Q11: Information security controls are commonly classified in
Q12: In symmetric key encryption _.<br>A)the key used
Q13: Integrity is defined as _.<br>A)maintaining restrictions on
Q14: Threats are _.<br>A)weaknesses in an information system