H
E
L
L
O
100

Which of the ff is not associated with asymmetric encryption?

A. No need for key exchange

B. Public keys

C. Private keys

D. Speed

D. Speed

100

An electronic document that certifies the identity of the owner of a particular public key?

A. Asymmetric encryption

B. Digital certificate

C. Digital signature

D. Public key

B. Digital certificate

100

VPN software creates private communication channels, often referred to as _______

Tunnel

100

Which among the following is an input control? 

a. File labels 

b. Batch Processing 

c. Reconciliation Procedures 

d. Data Matching

B. Batch Processing

100

These are in the form of unsolicited e-mail that contains either advertising or offensive content.

SPAM

200

An extra bit added to every character; used to check transmission accuracy.

 parity bit

200

What do you call a text file created by a website and is stored on visitor’s hard disk? 

a. IP Packets 

b. Digital Certificate 

c. Cookies

d. Source Document

C. Cookies

200

What is the foundation for Systems Reliability

Security

200

The Generally Accepted Privacy Principle was developed by the ff except? 

a. CICA 

b. AIPCA 

c. All of the above 

d. None of the above

B. AIPCPA

200

Hashing tests _____ instead of protecting confidentiality

Integrity

300

What are the three types of DRP?

1. Cold site

2. Hot site

3. Second datacenter

300

_____________ refers to the time between the last backup and the problem.

Recovery Point Objective

300

What is the unauthorized use of someone's personal information for the perpetrator's benefit?

Identity Theft

300

Which is not a principle that ensures system reliability 

A. Availability 

B. Processing integrity 

C. Confidentiality 

D. None of the above

D. None of the above

300

A non-spam email has all of the following factors except:  

a. The sender identity displayed 

b. A working link that enables the receiver to opt-out 

c. Both A and B 

d. Neither A or B

D. Neither A or B

400

AJ took a call from a client. "AJ, I need to interact online and real time with our affiliate in India, and I want to make sure that our communications aren't intercepted. What do you suggest?" AJ responded "The best solution will be to implement 

A. avirtualprivatenetwork." 

B. a private cloud environment." 

C. an asymmetric encryption system with digital signatures." 

D. multifactorauthentication."

A
400

confidential info should be encrypted: 

A. while stored, whenever not transmitted; 

B. while not stored, whenever transmitted; 

C. while stored, whenever transmitted; 

D. while not stored, whenever not transmitted

C. While stored, whenever transmitted
400

What provides the same level of assurance as to the enforceability of signed digital documents and signed written documents?

Digital signature

400

Modified true or false Digital stamp is an embedded code that identifies confidential information disclosed. What type of control is this? (preventive, detective, corrective)

False digital watermark 

Detective

400

In training for preserving confidentiality, employees need to know what data to protect, how to protect confidential data, recognize situations where sensitive information has not been properly protected and must proactively take preventive actions.

False. Corrective actions.

500

Give 5 out of the 10 internationally recognized best practices for protecting privacy of customers

1. Management

2. Notice

3. Choice and consent

4. Collection

5. Use and retention

6. Access

7. Disclosure to third parties

8. Security

9. Quality

10. Monitoring and enforcement

500

What are the four control of confidentiality and privacy?

1. Identification and Classification 

2. Encryption 

3. Control Access 

4. Training

500

What are the elements of the encryption process?

Plaintext 

Ciphertext 

Decryption 

Encryption/decription keys 

Algorithm

500

give all tests to validate input:

Field check

Sign check

Limit check

Range check

Size (or capacity) check

Completeness check

Validity check

500

Illustrate the Trust Service Framework.

Look at the board

M
e
n
u