In a public key infrastructure (PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer?

In a public key infrastructure (PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer? Nonrepudiation Encryption Authentication Integrity…

Continue ReadingIn a public key infrastructure (PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer?

When installing an intrusion detection system (IDS), which of the following is MOST important?

When installing an intrusion detection system (IDS), which of the following is MOST important? Properly locating it in the network architecture Preventing denial-of-service (DoS) attacks Identifying messages that need to…

Continue ReadingWhen installing an intrusion detection system (IDS), which of the following is MOST important?

Which of the following would provide the BEST protection against the hacking of a computer connected to the Internet?

Which of the following would provide the BEST protection against the hacking of a computer connected to the Internet? A remote access server A proxy server A personal firewall A…

Continue ReadingWhich of the following would provide the BEST protection against the hacking of a computer connected to the Internet?

An organization is using symmetric encryption. Which of the following would be a valid reason for moving to asymmetric encryption? Symmetric encryption:

An organization is using symmetric encryption. Which of the following would be a valid reason for moving to asymmetric encryption? Symmetric encryption: provides authenticity. is faster than asymmetric encryption. can…

Continue ReadingAn organization is using symmetric encryption. Which of the following would be a valid reason for moving to asymmetric encryption? Symmetric encryption:

Which of the following BEST describes the role of a directory server in a public key infrastructure (PKI)?

Which of the following BEST describes the role of a directory server in a public key infrastructure (PKI)? Encrypts the information transmitted over the network Makes other users' certificates available…

Continue ReadingWhich of the following BEST describes the role of a directory server in a public key infrastructure (PKI)?

An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:

An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if: IDS sensors are placed outside of the firewall. a behavior-based IDS is causing…

Continue ReadingAn IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:

An IS auditor reviewing access controls for a client-server environment should FIRST:

An IS auditor reviewing access controls for a client-server environment should FIRST: evaluate the encryption technique. identify the network access points. review the identity management system. review the application level…

Continue ReadingAn IS auditor reviewing access controls for a client-server environment should FIRST:

In auditing a web server, an IS auditor should be concerned about the risk of individuals gaining unauthorized access to confidential information through:

In auditing a web server, an IS auditor should be concerned about the risk of individuals gaining unauthorized access to confidential information through: common gateway interface (CGI) scripts. enterprise Java…

Continue ReadingIn auditing a web server, an IS auditor should be concerned about the risk of individuals gaining unauthorized access to confidential information through: