Page 823 - StudyBook.pdf
P. 823

Self Test Appendix • Appendix  807

                 11. The process of using a digital signature to verify a person’s credentials is called:
                      A. Alertness
                      B. Integration
                      C. Authentication
                      D. Authorization
                  Answer C.The act of verifying a person’s credentials is known as authentication.
                  Answers A, B, and D.Authorization refers to access control, which is a process that can only
                    occur after a person has been authenticated.The other terms have no meaning in this context.

                 12. A message is said to show integrity if the recipient receives an exact copy of the message sent
                    by the sender.Which of the following actions violates the integrity of a message? (Choose all
                    that apply)
                      A. Compressing the message
                      B. Spell checking the message and correcting errors
                      C. Editing the message
                      D. Appending an extra paragraph to a message
                  Answers B, C, and D. Correcting spelling errors in a message can alter the meaning of a mes-
                    sage, if the spelling errors were intentional. Editing the message and appending an additional
                    passage violates the integrity of a message as the recipient is no longer receiving an identical
                    message to what was actually sent.
                  Answer A.As long as a message can be decompressed to an identical bit-for-bit copy of the
                    original, compression does not alter the integrity of data.This includes software compression
                    such as “gzip” and hardware compression such as that done by tape drives that archive data.
                 13. Why is it important to safeguard confidentiality? (Select all that apply)
                      A. Because some information, such as medical records, is personal and should only be dis-
                         closed to necessary parties to protect an individual’s privacy.
                      B. Because certain information is proprietary and could damage an organization if it were
                         disclosed to the wrong parties.
                      C. Certain information might be dangerous in the wrong hands, so it should be guarded
                         closely to protect the safety of others.
                      D. Information leaks of any sort may damage an organization’s reputation.
                  Answers A, B, C, and D.All of these reasons are valid when considering why confidentiality
                    must be maintained.
                  N/A











                                                                              www.syngress.com
   818   819   820   821   822   823   824   825   826   827   828