Page 571 - StudyBook.pdf
P. 571
Basis of Cryptography • Chapter 9 555
13. Why is it important to safeguard confidentiality? (Select all that apply)
A. Because some information, such as medical records, is personal and should
only be disclosed to necessary parties to protect an individual’s privacy.
B. Because certain information is proprietary and could damage an organiza-
tion if it were disclosed to the wrong parties.
C. Certain information might be dangerous in the wrong hands, so it should
be guarded closely to protect the safety of others.
D. Information leaks of any sort may damage an organization’s reputation.
14. How can cryptography be used to implement access control?
A. By having people sign on using digital certificates, then placing restrictions
on a per-certificate basis that allows access only to a specified set of
resources.
B. By using a symmetric algorithm and only distributing the key to those you
want to have access to the encrypted information.
C. By digitally signing all documents.
D. By encrypting all documents.
15. You receive a digitally signed e-mail message.Which of the following actions
can the author take?
A. Send you another unsigned message.
B. Dispute the wording in parts of the message.
C. Claim the message was not sent.
D. Revoke the message.
www.syngress.com