Page 571 - StudyBook.pdf
P. 571

Basis of Cryptography • Chapter 9  555

                 13. Why is it important to safeguard confidentiality? (Select all that apply)

                    A. Because some information, such as medical records, is personal and should
                        only be disclosed to necessary parties to protect an individual’s privacy.
                    B. Because certain information is proprietary and could damage an organiza-
                        tion if it were disclosed to the wrong parties.
                    C. Certain information might be dangerous in the wrong hands, so it should
                        be guarded closely to protect the safety of others.
                    D. Information leaks of any sort may damage an organization’s reputation.

                 14. How can cryptography be used to implement access control?

                    A. By having people sign on using digital certificates, then placing restrictions
                        on a per-certificate basis that allows access only to a specified set of
                        resources.

                    B. By using a symmetric algorithm and only distributing the key to those you
                        want to have access to the encrypted information.
                    C. By digitally signing all documents.
                    D. By encrypting all documents.

                 15. You receive a digitally signed e-mail message.Which of the following actions
                    can the author take?

                    A. Send you another unsigned message.
                    B. Dispute the wording in parts of the message.
                    C. Claim the message was not sent.
                    D. Revoke the message.























                                                                              www.syngress.com
   566   567   568   569   570   571   572   573   574   575   576