Podcast
Questions and Answers
Which two types of compliance are laws?
Which two types of compliance are laws?
Which cryptographic algorithm is obsolete?
Which cryptographic algorithm is obsolete?
Which jurisdiction does the General Data Protection Regulation regulate?
Which jurisdiction does the General Data Protection Regulation regulate?
Which act regulates the United States Department of Education?
Which act regulates the United States Department of Education?
Signup and view all the answers
Which act regulates federal departments in the United States?
Which act regulates federal departments in the United States?
Signup and view all the answers
Which act regulates customer privacy in the finance industry?
Which act regulates customer privacy in the finance industry?
Signup and view all the answers
What is one of the three states of data?
What is one of the three states of data?
Signup and view all the answers
Which type of algorithm is a symmetric key?
Which type of algorithm is a symmetric key?
Signup and view all the answers
Which type of algorithm is an asymmetric key?
Which type of algorithm is an asymmetric key?
Signup and view all the answers
Which two types of algorithms are hashing algorithms?
Which two types of algorithms are hashing algorithms?
Signup and view all the answers
Which of the following best describes the permissions in a network access control list (ACL)?
Which of the following best describes the permissions in a network access control list (ACL)?
Signup and view all the answers
Which of the following best describes the types of access control lists (ACLs) commonly used?
Which of the following best describes the types of access control lists (ACLs) commonly used?
Signup and view all the answers
Which form of access control uses CAPTCHAs?
Which form of access control uses CAPTCHAs?
Signup and view all the answers
Which characteristic falls under accountability?
Which characteristic falls under accountability?
Signup and view all the answers
Which tool is used for vulnerability assessment?
Which tool is used for vulnerability assessment?
Signup and view all the answers
Which standards apply to any financial entity policies?
Which standards apply to any financial entity policies?
Signup and view all the answers
What company audits other companies for licensing requirements?
What company audits other companies for licensing requirements?
Signup and view all the answers
Which term is synonymous with symmetric cryptography?
Which term is synonymous with symmetric cryptography?
Signup and view all the answers
Which term is synonymous with asymmetric cryptography?
Which term is synonymous with asymmetric cryptography?
Signup and view all the answers
What are hash functions used for?
What are hash functions used for?
Signup and view all the answers