1. What term refers to property or data that is valuable to an organization? Threat Asset Risk Vulnerability 2. Which of the following respects confidentiality of information? Discussing confidential data over the telephone. Disclosing confidential information only to authorized persons. Sending confidential information to a colleague. Downloading confidential information on a shared website. 3. True or False: The more critical a component or service, the higher the level of availability required. True False
1. What term refers to property or data that is valuable to an organization?
2. Which of the following respects confidentiality of information?
3. True or False: The more critical a component or service, the higher the level of availability required.
4. What are the features of cyber security?
5.Which of the following actions compromise cyber security?
6. Which of the following types of
7. True or False: The advantage of a stream cipher is that you can reuse keys.
8. If an individual encrypts a message with his own private key, what does this assure?
9. Which of the following algorithms are not asymmetric?
10. Which cryptographic operation does not use a cryptographic key?
Step by step
Solved in 4 steps