Quiz
Note:
It is recommended that you save your response as you complete each question.
Question 1
(1 point)
Another name for cryptography strength is ____________, which is an estimate of the eFort
and resources it would take an attacker to penetrate a cryptosystem. ±ill in the blank.
Question 1 options:
Secrecy
Work factor
Cryptanalysis
Decryption
Save
Question 2
(1 point)
DiFerent functionalities of security controls are applied to produce the desired security
outcomes. Which of the following security controls is intended to ²x components or systems
after an incident has occurred?
Question 2 options:
Detective
Compensating
Corrective
Preventive
Save
Question 3
(1 point)
What is the formula for calculating Annualized Loss Expectancy (ALE)?
Question 3 options:
SLE * ARO
SLE / ARO
SLE x asset value (in $) / exposure factor
SLE x asset value (in $) * exposure factor
Save
Question 4
(1 point)
Which of the following has not increased the need for more privacy laws and governance?
Question 4 options:
Data aggregation and retrieval technologies advancement
Loss of boarders
Increased cyber crimes
Convergent technologies advancements
Save
Question 5
(1 point)
Which of the following is not a law, but is required for any organization that processes,
transmits, stores, or accepts credit card data?
Question 5 options:
Gramm-Leach-Bliley Act of 1999