Podcast
Questions and Answers
Which of the following is a threat to confidentiality?
Which of the following is a threat to confidentiality?
- Authorized users
- Unprotected Downloads
- Software hooks
- Hackers (correct)
Who are masqueraders?
Who are masqueraders?
- Unauthorized users
- Hackers
- Authorized users (correct)
- Software developers
What are unauthorized users?
What are unauthorized users?
- Hackers
- Unauthorized users (correct)
- Authorized users
- Software developers
What is a threat to integrity?
What is a threat to integrity?
What are software hooks?
What are software hooks?
Which term refers to a method of encryption and decryption?
Which term refers to a method of encryption and decryption?
What is the purpose of a key in encryption and decryption?
What is the purpose of a key in encryption and decryption?
Are the encryption key and decryption key always the same for most algorithms?
Are the encryption key and decryption key always the same for most algorithms?