A digital certificate for software can attest to the quality of the software

A digital certificate for software can attest to the

This preview shows page 15 - 18 out of 110 pages.

15.A digital certificate for software can attest to the quality of the software. PTS: 1 REF: 456 16.Digital certificates never expire. PTS: 1 REF: 458 17.Message packets on the Internet travel a planned path from a source node to a destination node. PTS: 1 REF: 459 18.Any message traveling on the Internet is subject to secrecy, integrity, and necessitythreats. PTS: 1 REF: 459 19.One significant threat to electronic commerce is theft of sensitive or personal information. PTS: 1 REF: 460 20.Secrecy protection is a legal matter. PTS: 1 REF: 460 21.E-mail secrecy issues address whether company supervisors should be permitted to read employees’ messages randomly. PTS: 1 REF: 460 22.A computer that has experienced a necessity threat slows processing to an intolerably slow speed. PTS: 1 REF: 463 23.The shorter the session key, the more resistant the encryption is to attack. PTS: 1 REF: 469 24.A Web browser that has entered into an SSL session indicates that it is in an encrypted session.
Image of page 15
PTS: 1 REF: 469 25.A hash algorithm uses a secret key. PTS: 1 REF: 472-473 MULTIPLE CHOICE 1.____ is the protection of computer assets from unauthorized access, use, alteration, or destruction. PTS: 1 REF: 440 2.Any act or object that poses a danger to computer assets is known as a ____. a.problemc.threatb.concernd.riskANS: C PTS: 1 REF: 440 3.The protection of assets using nonphysical means is called ____ security. PTS: 1 REF: 440 4.A(n) ____ is a person or device that is able to listen in on and copy Internet transmissions. PTS: 1 REF: 441 5.Originally, the term ____ was used to describe a dedicated programmer who enjoyedwriting complex code that tested the limits of technology. PTS: 1 REF: 441 6.____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source. a.Necessityc.Integrityb.Secrecyd.EncryptionANS: B PTS: 1 REF: 441
Image of page 16
7.____ refers to preventing unauthorized data modification. PTS: 1 REF: 441 8.____ refers to preventing data delays or denials. PTS: 1 REF: 441
Image of page 17
Image of page 18

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture