Questions and Answers
Which two types of compliance are laws? Choose two answers.
Regulatory and Gramm-Leech-Bliley (GLB)
What are two common types of access control lists (ACLs)? Choose two answers.
Attribute-based and network
Which term is synonymous with symmetric cryptography?
Secret key cryptography
Which term is synonymous with asymmetric cryptography?
Signup and view all the answers
Which tool is used for vulnerability assessment?
Signup and view all the answers
What company audits other companies for licensing requirements?
Signup and view all the answers
What are hash functions used for?
Signup and view all the answers
Which form of access control uses CAPTCHAs?
Signup and view all the answers
Which characteristic falls under accountability?
Signup and view all the answers
What is the disadvantage of logging?
Signup and view all the answers
Which encryption method was named after Julius Caesar and is easily breakable?
Signup and view all the answers
What jurisdiction does the General Data Protection Regulation (GDPR) regulate?
Signup and view all the answers
Which act regulates the United States Department of Education?
Signup and view all the answers
Which act regulates federal departments in the United States?
Signup and view all the answers
Which act regulates customer privacy in the finance industry?
Signup and view all the answers
What are the three states of data?
Signup and view all the answers
Which type of algorithm is a symmetric key?
Signup and view all the answers
Which type of algorithm is an asymmetric key?
Signup and view all the answers
Which two algorithms are hashing algorithms?
Signup and view all the answers
What term refers to the process of gathering and analyzing information to support business decisions?
Signup and view all the answers
What is the correct order of steps in the Operations Security Process?
Signup and view all the answers
What does vulnerability analysis involve?
Signup and view all the answers
What is considered the weakest link in a security program?
Signup and view all the answers
Which social engineering technique uses electronic communications to carry out a broad attack?
Signup and view all the answers
Which law of operations security emphasizes the importance of identifying critical information?
Signup and view all the answers