100%(13)13 out of 13 people found this document helpful
This preview shows page 15 - 18 out of 110 pages.
15.A digital certificate for software can attest to the quality of the software.PTS:1REF:45616.Digital certificates never expire.PTS:1REF:45817.Message packets on the Internet travel a planned path from a source node to a destination node.PTS:1REF:45918.Any message traveling on the Internet is subject to secrecy, integrity, and necessitythreats.PTS:1REF:45919.One significant threat to electronic commerce is theft of sensitive or personal information.PTS:1REF:46020.Secrecy protection is a legal matter.PTS:1REF:46021.E-mail secrecy issues address whether company supervisors should be permitted to read employees’ messages randomly.PTS:1REF:46022.A computer that has experienced a necessity threat slows processing to an intolerably slow speed.PTS:1REF:46323.The shorter the session key, the more resistant the encryption is to attack.PTS:1REF:46924.A Web browser that has entered into an SSL session indicates that it is in an encrypted session.
PTS:1REF:46925.A hash algorithm uses a secret key.PTS:1REF:472-473MULTIPLE CHOICE1.____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.PTS:1REF:4402.Any act or object that poses a danger to computer assets is known as a ____.a.problemc.threatb.concernd.riskANS: CPTS:1REF:4403.The protection of assets using nonphysical means is called ____ security.PTS:1REF:4404.A(n) ____ is a person or device that is able to listen in on and copy Internet transmissions.PTS:1REF:4415.Originally, the term ____ was used to describe a dedicated programmer who enjoyedwriting complex code that tested the limits of technology.PTS:1REF:4416.____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.a.Necessityc.Integrityb.Secrecyd.EncryptionANS: BPTS:1REF:441
7.____ refers to preventing unauthorized data modification.PTS:1REF:4418.____ refers to preventing data delays or denials.PTS:1REF:441