1. What type of cryptosystem is characterized by data being encrypted by the sender using the recipient's public key, and the data then being decrypted using the recipient's private key?
A) With public-key encryption, or symmetric encryption
B) With public-key encryption, or asymmetric encryption
C) With shared-key encryption, or symmetric encryption
D) With shared-key encryption, or asymmetric encryption
2. How does the SSL network protocol provide confidentiality?
A) Through symmetric encryption such as RSA
B) Through asymmetric encryption such as Data Encryption Standard, or DES
C) Through asymmetric encryption such as Advanced Encryption Standard, or AES
D) Through symmetric encryption such as Data Encryption Standard, or DES
3. What are used as the framework for developing logical access controls?
A) Information systems security policies
B) Organizational security policies
C) Access Control Lists (ACL)
D) Organizational charts for identifying roles and responsibilities
4. Which of the following are effective controls for detecting duplicate transactions such as payments made or received?
A) Concurrency controls
B) Reasonableness checks
C) Time stamps
D) Referential integrity controls
5. Which of the following is a good control for protecting confidential data residing on a PC?
A) Personal firewall
B) File encapsulation
C) File encryption
D) Host-based intrusion detection