Ais615 Tutorial Chapter 9 Q
Ais615 Tutorial Chapter 9 Q
1. ___ Virtual Private a. A hash encrypted with the creator’s private key
Network (VPN)
2. ___ Data Loss Prevention b. A company that issues pairs of public and private keys and
(DLP) verifies the identity of the owner of those keys.
3. ___ Digital signature c. A secret mark used to identify proprietary information.
4. ___ Digital certificate d. An encrypted tunnel used to transmit information securely
across the Internet.
5. ___ Data masking e. Replacing real data with fake data.
6. ___ Symmetric f. Unauthorized use of facts about another person to commit
encryption fraud or other crimes.
7. ___ Spam g. The process of turning ciphertext into plaintext.
8. ___ Plaintext h. Unwanted e-mail.
9. ___ Hashing i. A document or file that can be read by anyone who accesses
it.
10. __Ciphertext j. Used to store an entity’s public key, often found on web sites.
11. ___Information rights k. A procedure to filter outgoing traffic to prevent confidential
management (IRM) information from leaving.
12. __ Certificate authority l. A process that transforms a document or file into a fixed
length string of data.
13. ___ Non-repudiation m. A document or file that must be decrypted to be read.
14. ___ Digital watermark n. A copy of an encryption key stored securely to enable
decryption if the original encryption key becomes
unavailable.
15. ___ Asymmetric o. An encryption process that uses a pair of matched keys, one
encryption public and the other private. Either key can encrypt
something, but only the other key in that pair can decrypt it.
16. __ Key escrow p. An encryption process that uses the same key to both encrypt
and decrypt.
q. The inability to unilaterally deny having created a document
or file or having agreed to perform a transaction.
r. Software that limits what actions (read, copy, print, etc.) users
granted access to a file or document can perform.
1. Websites often provide a link to the organization’s privacy policy. Doing so most directly
satisfies the requirements of the section of GAPP referred to as _____.
a. management
b. notice
c. quality
d. collection
2. Which of the following factors increase the strength of an encryption solution?
a. Securely storing encryption keys somewhere other than in the browser.
b. Keeping the encryption algorithm secret.
c. Using a 24-bit encryption key.
d. All three options increase the strength of an encryption solution.
e. None of the three factors increase the strength of an encryption solution.
5. GAPP stresses the importance of obtaining consent when collecting, using, and sharing
information about customers. If a company’s policy is to ask customers for permission to
collect sensitive personal information and then only asks questions about sensitive
matters (such as political beliefs or sexual orientation) after the customer agrees to
answer such questions, it is following the process referred to as _____.
a. explicit consent (opt-out)
b. explicit consent (opt-in)
c. implicit consent (opt-out)
d. implicit consent (opt-in)