πŸ“Š Information and Network Security
Q. Integrity is protection of data from all of the following except ________.
  • (A) Unauthorized changes
  • (B) Accidental changes
  • (C) Data analysis
  • (D) Intentional manipulation
πŸ’¬ Discuss
βœ… Correct Answer: (C) Data analysis
πŸ“Š Information and Network Security
Q. A security program cannot address which of the following business goals?
  • (A) Accuracy of information
  • (B) Change control
  • (C) User expectations
  • (D) Prevention of fraud
πŸ’¬ Discuss
βœ… Correct Answer: (A) Accuracy of information
πŸ“Š Information and Network Security
Q. Asymmetric key cryptography is used for all of the following except_______.
  • (A) Encryption of data
  • (B) Access control
  • (C) Nonrepudiation
  • (D) Steganography
πŸ’¬ Discuss
βœ… Correct Answer: (D) Steganography
πŸ“Š Information and Network Security
Q. DES stands for ________________.
  • (A) Device Encryption Standard
  • (B) Data Encrypted Standard
  • (C) Data Encryption Security
  • (D) Data Encryption Standard
πŸ’¬ Discuss
βœ… Correct Answer: (D) Data Encryption Standard
πŸ“Š Information and Network Security
Q. ____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.
  • (A) Twofish
  • (B) IDEA
  • (C) DES
  • (D) AES
πŸ’¬ Discuss
βœ… Correct Answer: (D) AES
πŸ“Š Information and Network Security
Q. AES stands for ________________.
  • (A) Active Encryption Standard
  • (B) Advanced Encrypted Standard
  • (C) Advanced Encryption Standar
  • (D) D Advanced Encryption Security
πŸ’¬ Discuss
βœ… Correct Answer: (C) Advanced Encryption Standar
πŸ“Š Information and Network Security
Q. _____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.
  • (A) Chorography
  • (B) Tomography
  • (C) Steganography
  • (D) Cryptography
πŸ’¬ Discuss
βœ… Correct Answer: (C) Steganography

Jump to