Question
Answered

(CO 5) _____ algorithms provide no proof of identity of a message's...

(CO 5) _____ algorithms provide no proof of identity of a message's originator.

Group of answer choices



Symmetric


Asymmetric


Computer


Mobile

 

Flag this Question

Question 14

10 pts

(CO 5) A data-centric model tries to account for the _____ of data as they move from device to device.

Group of answer choices



validity


errors


user friendliness


fluidity

 

Flag this Question

Question 15

10 pts

(CO 5) _____ is a security service that prevents access to the device's data store without the proper authentication and authorization.

Group of answer choices



Device control


Data control


Privilege control


Access control

 

Flag this Question

Question 16

10 pts

(CO 5) _____ is the use of a cryptographic process to transform information into a form that cannot be understood by unauthorized people.

Group of answer choices



Key


Decryption


Cryptography


Encryption

 

Flag this Question

Question 17

10 pts

(CO 5) Encryption can be the most powerful tool in protecting a data-centric mobile environment. In fact, it is the most _____ of all the security mechanisms.

Group of answer choices



device-centric


data-centric


authentication-centric


server-centric

 

Flag this Question

Question 18

10 pts

(CO 6) Some mobile security controls are shaped by

Group of answer choices



organization culture.


policy.


direct controls.


management request.

 

Flag this Question

Question 19

10 pts

(CO 6) Policies are the most common examples of which one of the following controls?

Group of answer choices



Directive


Reactive


Preventive


Physical

 

Flag this Question

Question 20

10 pts

(CO 6) One of the common tests performed by network access controls is

Group of answer choices



scan disks.


fragmentation.


prior authorization check for devices.


calling the FBI.

 

Flag this Question

Question 21

10 pts

(CO 6) If the IT department is creating an impression for the attacker that the effort required to circumvent the security controls is far greater than the potential reward, this is categorized as

Group of answer choices



directive controls.


deterrent controls.


detective controls.


reactive controls.

 

Flag this Question

Question 22

10 pts

(CO 6) A commonly used deterrent control is the creation of a strong education and _____ program used to inform employees of the issues and acceptable practices surrounding the use of mobile technologies in the organization.

Group of answer choices



awareness


enforcement


IT department


defensive

Answer & Explanation
Verified Solved by verified expert
<p>icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis.</p> Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer

risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae od

ng elit. Nam lacinia pulvinar tortor nec f

aoreeipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitu

acinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante,


ur laoreet

ctum vitae odioipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a

tesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui le


usce dui

entesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus,et, consectetur adipicing elit. Nam lacinia pulvinar

Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, con


onec aliqu

onec aliquet. Lorem ipsum dolor sit amet, coamet, c

ipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus an


ng elit. N

ur laorur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac mainia pul

consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilis


onec aliq

usce dui lectus, congue vel laoreet ac, dictum vitae odio. Donecm ipsum dolor sit amet, consectetur ad

inia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante,


cing elit.

usce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapacinia pulvinar t

tesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel


ur laoreet

usce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lour laoreetDonec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibu

o. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. P

Student review
100% (1 rating)