Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.
A. It determines the actions and behaviors of a single individual within a system
B. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
C. It ensures that modifications are not made to data by unauthorized personnel or processes.
D. It ensures that internal information is consistent among all subentities and also consistent with th real- world, external situation.
Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?
A. HTTPS
B. PPTP
C. L2TP
D. SMTP
Which of the following are the basic architectures of microprocessors used in modern computers? Each correct answer represents a complete solution. Choose two.
A. ASCII
B. RISC
C. CISC
D. PCIe
Which of the following protocols are used to provide secure communication between a client and a server over the Internet? Each correct answer represents a part of the solution. Choose two.
A. SNMP
B. TLS
C. HTTP
D. SSL
How many keys are used to encrypt data in symmetric encryption?
A. Four
B. One
C. Two
D. Three
Which of the following is not a major concern in traditional business transactions as compare to online transactions?
A. Bookkeeping
B. Security
C. Product Quality
D. Customer Support
A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.
A. Man-in-the-middle
B. Brute force
C. Denial of Service (DoS)
D. Dictionary
Which of the following law does not protect intellectual property?
A. Murphy's law
B. Patent law
C. Trademark
D. Copyright
Which of the following is the rating for gasoline or oil fires?
A. Class B
B. Class D
C. Class A
D. Class C
Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)? Each correct answer represents a complete solution. Choose three.
A. Authentication
B. Data encryption
C. Authorization
D. Accounting