Podcast
Questions and Answers
Which two types of compliance are laws?
Which two types of compliance are laws?
- FERPA and FISMA
- HIPAA and FERPA
- HIPAA and GLBA (correct)
- GLBA and FISMA
Which cryptographic algorithm is obsolete?
Which cryptographic algorithm is obsolete?
- SHA
- DES
- ECC
- Caeser cipher (correct)
Which jurisdiction does the General Data Protection Regulation regulate?
Which jurisdiction does the General Data Protection Regulation regulate?
- Australia
- United States
- Canada
- European Union (correct)
Which act regulates the United States Department of Education?
Which act regulates the United States Department of Education?
Which act regulates federal departments in the United States?
Which act regulates federal departments in the United States?
Which act regulates customer privacy in the finance industry?
Which act regulates customer privacy in the finance industry?
What is one of the three states of data?
What is one of the three states of data?
Which type of algorithm is a symmetric key?
Which type of algorithm is a symmetric key?
Which type of algorithm is an asymmetric key?
Which type of algorithm is an asymmetric key?
Which two types of algorithms are hashing algorithms?
Which two types of algorithms are hashing algorithms?
Which of the following best describes the permissions in a network access control list (ACL)?
Which of the following best describes the permissions in a network access control list (ACL)?
Which of the following best describes the types of access control lists (ACLs) commonly used?
Which of the following best describes the types of access control lists (ACLs) commonly used?
Which form of access control uses CAPTCHAs?
Which form of access control uses CAPTCHAs?
Which characteristic falls under accountability?
Which characteristic falls under accountability?
Which tool is used for vulnerability assessment?
Which tool is used for vulnerability assessment?
Which standards apply to any financial entity policies?
Which standards apply to any financial entity policies?
What company audits other companies for licensing requirements?
What company audits other companies for licensing requirements?
Which term is synonymous with symmetric cryptography?
Which term is synonymous with symmetric cryptography?
Which term is synonymous with asymmetric cryptography?
Which term is synonymous with asymmetric cryptography?
What are hash functions used for?
What are hash functions used for?
Flashcards are hidden until you start studying