Which of the ff is not associated with asymmetric encryption?
A. No need for key exchange
B. Public keys
C. Private keys
D. Speed
D. Speed
An electronic document that certifies the identity of the owner of a particular public key?
A. Asymmetric encryption
B. Digital certificate
C. Digital signature
D. Public key
B. Digital certificate
VPN software creates private communication channels, often referred to as _______
Tunnel
Which among the following is an input control?
a. File labels
b. Batch Processing
c. Reconciliation Procedures
d. Data Matching
B. Batch Processing
These are in the form of unsolicited e-mail that contains either advertising or offensive content.
SPAM
An extra bit added to every character; used to check transmission accuracy.
parity bit
What do you call a text file created by a website and is stored on visitor’s hard disk?
a. IP Packets
b. Digital Certificate
c. Cookies
d. Source Document
C. Cookies
What is the foundation for Systems Reliability
Security
The Generally Accepted Privacy Principle was developed by the ff except?
a. CICA
b. AIPCA
c. All of the above
d. None of the above
B. AIPCPA
Hashing tests _____ instead of protecting confidentiality
Integrity
What are the three types of DRP?
1. Cold site
2. Hot site
3. Second datacenter
_____________ refers to the time between the last backup and the problem.
Recovery Point Objective
What is the unauthorized use of someone's personal information for the perpetrator's benefit?
Identity Theft
Which is not a principle that ensures system reliability
A. Availability
B. Processing integrity
C. Confidentiality
D. None of the above
D. None of the above
A non-spam email has all of the following factors except:
a. The sender identity displayed
b. A working link that enables the receiver to opt-out
c. Both A and B
d. Neither A or B
D. Neither A or B
AJ took a call from a client. "AJ, I need to interact online and real time with our affiliate in India, and I want to make sure that our communications aren't intercepted. What do you suggest?" AJ responded "The best solution will be to implement
A. avirtualprivatenetwork."
B. a private cloud environment."
C. an asymmetric encryption system with digital signatures."
D. multifactorauthentication."
confidential info should be encrypted:
A. while stored, whenever not transmitted;
B. while not stored, whenever transmitted;
C. while stored, whenever transmitted;
D. while not stored, whenever not transmitted
What provides the same level of assurance as to the enforceability of signed digital documents and signed written documents?
Digital signature
Modified true or false Digital stamp is an embedded code that identifies confidential information disclosed. What type of control is this? (preventive, detective, corrective)
False digital watermark
Detective
In training for preserving confidentiality, employees need to know what data to protect, how to protect confidential data, recognize situations where sensitive information has not been properly protected and must proactively take preventive actions.
False. Corrective actions.
Give 5 out of the 10 internationally recognized best practices for protecting privacy of customers
1. Management
2. Notice
3. Choice and consent
4. Collection
5. Use and retention
6. Access
7. Disclosure to third parties
8. Security
9. Quality
10. Monitoring and enforcement
What are the four control of confidentiality and privacy?
1. Identification and Classification
2. Encryption
3. Control Access
4. Training
What are the elements of the encryption process?
Plaintext
Ciphertext
Decryption
Encryption/decription keys
Algorithm
give all tests to validate input:
Field check
Sign check
Limit check
Range check
Size (or capacity) check
Completeness check
Validity check
Illustrate the Trust Service Framework.
Look at the board