89 which of the following is not a security concern

Info iconThis preview shows pages 10–13. Sign up to view the full content.

View Full Document Right Arrow Icon
89 Which of the following is NOT a security concern about ActiveX? A. ActiveX has a robust sandbox that protects the rest of the system. B. Malicious ActiveX code can't be prevented from damaging a client. C. An ActiveX control has complete access to the entire client system. D. The digital signature on an ActiveX control tells only whether it's genuine. Answer: A See Chapter 5. ActiveX has no sandbox; the other concerns are legitimate. 90 RAID stands for A. Recoverable Array of Independent Disks
Background image of page 10

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
B. Risk Analysis Initiation Detail C. Redundant Array of Independent Disks D. Robust Array of Inexpensive Disks Answer: C See Chapter 5. RAID is an acronym for Redundant Array of Independent Disks. 91 The process of breaking the key and/or plaintext from an enciphered message is known as A. Decryption B. Steganography C. Cryptanalysis D. Extraction Answer: C See Chapter 7. Cryptanalysis is the process of getting the key and/or the original message the hard way. 92 The method of encryption in which both sender and recipient possess a common encryption key is known as A. Message digest B. Hash function C. Public key cryptography D. Secret key cryptography Answer: D See Chapter 7. Secret key cryptography is used when all parties possess a common key. 93 Why would a user’s public encryption key be widely distributed? A. So that cryptographers can attempt to break it. B. Because it’s encrypted. C. Because the user’s private key can’t be derived from his or her public key. D. So that the user can decrypt messages from any location. Answer: C See Chapter 7. In public key cryptography, the value of the public key doesn’t in any way betray the value of the secret key. 94 Reading down the columns of a message that has been written across is known as A. A columnar transposition cipher B. Calculating the hash C. Calculating the checksum D. Calculating the modulo
Background image of page 11
Answer: A See Chapter 7. In this cipher, the cryptographer writes across but reads down. 95 An asymmetric cryptosystem is also known as a A. Message digest B. Hash function C. Public key cryptosystem D. Secret key cryptosystem Answer: C See Chapter 7. Asymmetric cryptosystems are also known as public key cryptosystems. 96 The process of hiding a message inside a larger dataset is known as A. Decryption B. Steganography C. Cryptanalysis D. Extraction Answer: B See Chapter 7. Steganography is the science of inserting messages into larger datasets so that the existence of the message is not easily detected. 97 Steganography isn't easily noticed because A. Monitor and picture quality are so good these days. B. Most PC speakers are turned off or disabled. C. The human eye often can’t sense the noise that steganography introduces. D.
Background image of page 12

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page10 / 13

89 Which of the following is NOT a security concern about...

This preview shows document pages 10 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online