Podcast
Questions and Answers
Which two types of compliance are laws? Choose two answers.
Which two types of compliance are laws? Choose two answers.
- Regulatory and HIPAA
- HIPAA and Gramm-Leech-Bliley (GLB)
- Regulatory and Gramm-Leech-Bliley (GLB) (correct)
- HIPAA and BSA
What are two common types of access control lists (ACLs)? Choose two answers.
What are two common types of access control lists (ACLs)? Choose two answers.
- Asymmetric and regulatory
- Attribute-based and network (correct)
- Attribute-based and secret key
- Secret key and asymmetric
Which term is synonymous with symmetric cryptography?
Which term is synonymous with symmetric cryptography?
- Secret key cryptography (correct)
- Asymmetric cryptography
- Hash functions
- Attribute-based access control
Which term is synonymous with asymmetric cryptography?
Which term is synonymous with asymmetric cryptography?
Which tool is used for vulnerability assessment?
Which tool is used for vulnerability assessment?
What company audits other companies for licensing requirements?
What company audits other companies for licensing requirements?
What are hash functions used for?
What are hash functions used for?
Which form of access control uses CAPTCHAs?
Which form of access control uses CAPTCHAs?
Which characteristic falls under accountability?
Which characteristic falls under accountability?
What is the disadvantage of logging?
What is the disadvantage of logging?
Which encryption method was named after Julius Caesar and is easily breakable?
Which encryption method was named after Julius Caesar and is easily breakable?
What jurisdiction does the General Data Protection Regulation (GDPR) regulate?
What jurisdiction does the General Data Protection Regulation (GDPR) regulate?
Which act regulates the United States Department of Education?
Which act regulates the United States Department of Education?
Which act regulates federal departments in the United States?
Which act regulates federal departments in the United States?
Which act regulates customer privacy in the finance industry?
Which act regulates customer privacy in the finance industry?
What are the three states of data?
What are the three states of data?
Which type of algorithm is a symmetric key?
Which type of algorithm is a symmetric key?
Which type of algorithm is an asymmetric key?
Which type of algorithm is an asymmetric key?
Which two algorithms are hashing algorithms?
Which two algorithms are hashing algorithms?
What term refers to the process of gathering and analyzing information to support business decisions?
What term refers to the process of gathering and analyzing information to support business decisions?
What is the correct order of steps in the Operations Security Process?
What is the correct order of steps in the Operations Security Process?
What does vulnerability analysis involve?
What does vulnerability analysis involve?
What is considered the weakest link in a security program?
What is considered the weakest link in a security program?
Which social engineering technique uses electronic communications to carry out a broad attack?
Which social engineering technique uses electronic communications to carry out a broad attack?
Which law of operations security emphasizes the importance of identifying critical information?
Which law of operations security emphasizes the importance of identifying critical information?