Page 823 - StudyBook.pdf
P. 823
Self Test Appendix • Appendix 807
11. The process of using a digital signature to verify a person’s credentials is called:
A. Alertness
B. Integration
C. Authentication
D. Authorization
Answer C.The act of verifying a person’s credentials is known as authentication.
Answers A, B, and D.Authorization refers to access control, which is a process that can only
occur after a person has been authenticated.The other terms have no meaning in this context.
12. A message is said to show integrity if the recipient receives an exact copy of the message sent
by the sender.Which of the following actions violates the integrity of a message? (Choose all
that apply)
A. Compressing the message
B. Spell checking the message and correcting errors
C. Editing the message
D. Appending an extra paragraph to a message
Answers B, C, and D. Correcting spelling errors in a message can alter the meaning of a mes-
sage, if the spelling errors were intentional. Editing the message and appending an additional
passage violates the integrity of a message as the recipient is no longer receiving an identical
message to what was actually sent.
Answer A.As long as a message can be decompressed to an identical bit-for-bit copy of the
original, compression does not alter the integrity of data.This includes software compression
such as “gzip” and hardware compression such as that done by tape drives that archive data.
13. Why is it important to safeguard confidentiality? (Select all that apply)
A. Because some information, such as medical records, is personal and should only be dis-
closed to necessary parties to protect an individual’s privacy.
B. Because certain information is proprietary and could damage an organization if it were
disclosed to the wrong parties.
C. Certain information might be dangerous in the wrong hands, so it should be guarded
closely to protect the safety of others.
D. Information leaks of any sort may damage an organization’s reputation.
Answers A, B, C, and D.All of these reasons are valid when considering why confidentiality
must be maintained.
N/A
www.syngress.com