<< Prev Question Next Question >>

Question 89/113

Two friends want to exchange a confidential document by e-mail. They decide to use cryptography to protect the confidentiality of the document. To be able to encrypt alid decrypt the document they first exchange the key that is both used for encryption and decryption by phone.
What type of encryption system is used by the two friends?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (113q)
Question 1: In most organizations, access to the computer or the network...
Question 2: To which category of security measures does a smoke alarm be...
Question 3: What is the relationship between data and information?...
Question 4: Some security measures are optional. Other security measures...
Question 5: You read in the newspapers that the ex-employee of a large c...
Question 6: Which legislation regulates the storage and destruction of a...
Question 7: Which approach does/did the United States take with regard t...
Question 8: What is a human threat to the reliability of the information...
Question 9: Which type of malware is a program that collects information...
Question 10: What is not a category for security measures?...
Question 11: Under which condition is an employer permitted to check if I...
Question 12: What is the best description of a risk analysis?...
Question 13: There are three types of human threats: Intentional human th...
Question 14: Someone sends an e-mail. The sender wants the recipient to b...
Question 15: At Midwest Insurance, all information is classified. What is...
Question 16: What is an example of a security incident?...
Question 17: You work for a large organization. You notice that you have ...
Question 18: Physical security must protect a company for anyone to easil...
Question 19: You are the owner of SpeeDelivery courier service. Because o...
Question 20: You are the owner of the courier company SpeeDelivery. On th...
Question 21: What do employees need to know to report a security incident...
Question 22: Midwest Insurance controls access to its offices with a pass...
Question 23: Within a company several employees work mostly outside the p...
Question 24: My user profile specifies which network drives I can read an...
Question 25: What is the purpose of a Disaster Recovery Plan (DRP)?...
Question 26: We can acquire and supply information in various ways. The v...
Question 27: You are a consultant and are regularly hired by the Ministry...
Question 28: Some threats are caused directly by people, others have a na...
Question 29: A well executed risk analysis provides a great deal of usefu...
Question 30: Which one of the threats listed below can occur as a result ...
Question 31: What is 'a potential cause of an unwanted incident, which ma...
Question 32: The incident cycle has four stages. Which stage follows the ...
Question 33: A Dutch company is processing information from Dutch civilia...
Question 34: What is an example of a non-human threat to the physical env...
Question 35: You work for a flexible employer who doesn't mind if you wor...
Question 36: You have just started working at a large organization. You h...
Question 37: You are the first to arrive at work in the morning and notic...
Question 38: What sort of security does a Public Key Infrastructure (PKI)...
Question 39: Who is authorized to change the classification of a document...
Question 40: An airline company employee notices that she has access to o...
Question 41: What physical security measure is necessary to control acces...
Question 42: Which regulation is only applicable for United States public...
Question 43: You own a store, and money keeps disappearing from the cash ...
Question 44: An employee in the administrative department of Smiths Consu...
Question 45: Peter works at the company Midwest Insurance. His manager, L...
Question 46: You work for a large organization. You notice that you have ...
Question 47: The act of taking organizational security measures is inextr...
Question 48: Midwest Insurance grades the monthly report of all claimed l...
Question 49: Your organization has an office with space for twenty five (...
Question 50: You are the owner of the courier company SpeeDelivery. You h...
Question 51: What is the purpose of authentication?...
Question 52: Midwest Insurance controls access to its offices with a pass...
Question 53: What is the greatest risk for an organization if no informat...
Question 54: You are the owner of a growing company, SpeeDelivery, which ...
Question 55: An Incident Management process has several purposes. Which i...
Question 56: Which type of malware is a program which, in addition to the...
Question 57: You work in the office of a large company. You receive a cal...
Question 58: When we are at our desk, we want the information system and ...
Question 59: Which threat can materialize as a result of the absence of p...
Question 60: A hacker gains access to a webserver and deletes a file on t...
Question 61: What is the most important reason for applying segregation o...
Question 62: What is the objective of classifying information?...
Question 63: Two friends want to exchange a confidential document. It is ...
Question 64: Susan sends an email to Paul. Who determines the meaning and...
Question 65: Which is a legislative or regulatory act related to informat...
Question 66: What is the most common risk strategy besides Risk bearing a...
Question 67: Which of these is not malicious software?...
Question 68: Your company is concerned about the effect of global warming...
Question 69: In the organization where you work, information of a very se...
Question 70: Why is air-conditioning placed in the server room?...
Question 71: There are three types of "human threats". The threat that a ...
Question 72: You apply for a position in another company and get the job....
Question 73: Which type of malware builds a network of contaminated compu...
Question 74: What is not a criteria in the review process where it is det...
Question 75: A couple of years ago you started your company which has now...
Question 76: What are the two main types of damage, resulting from incide...
Question 77: What action is an unintentional human threat?...
Question 78: During a risk analysis a system administrator mentions that ...
Question 79: What is the best way to comply with legislation and regulati...
Question 80: You have an office that designs corporate logos. You have be...
Question 81: What is accomplished if reports are assigned the appropriate...
Question 82: The Information Security Manager (ISM) at Smith Consultants ...
Question 83: Why is sensitive information graded?...
Question 84: Why is compliance important for the reliability of the infor...
Question 85: What is an example of a good physical security measure?...
Question 86: There is a network printer in the hallway of the company whe...
Question 87: What is a repressive measure in the case of a fire?...
Question 88: The term 'big data' is commonly used. However data itself ha...
Question 89: Two friends want to exchange a confidential document by e-ma...
Question 90: What is a risk analysis used for?...
Question 91: A marketing employee accidentally e-mails a spreadsheet with...
Question 92: Three characteristics determine the reliability of informati...
Question 93: What is the purpose for an organization to have an informati...
Question 94: What is the definition of the Annual Loss Expectancy?...
Question 95: Lightning strikes the data center and the power surge destro...
Question 96: After a thorough risk analysis and the identification of app...
Question 97: Logging in to a computer system is an access-granting proces...
Question 98: An employee detects abnormal behavior of her desktop compute...
Question 99: Which measure assures that valuable information is not left ...
Question 100: What is the goal of an organization's security policy?...
Question 101: The company Midwest Insurance has taken many measures to pro...
Question 102: What is the physical equivalent of the logical information s...
Question 103: You have a small office in an industrial areA. You would lik...
Question 104: What is the relationship between data and information?...
Question 105: The consultants at Smith Consultants Inc. work on laptops th...
Question 106: Which legislation makes it easier to deal with offences perp...
Question 107: A company moves into a new building. A few weeks after the m...
Question 108: Your organization has an office with space for 25 workstatio...
Question 109: You are the owner of the SpeeDelivery courier service. Last ...
Question 110: You work in the IT department of a medium-sized company. Con...
Question 111: Of which concept is 'measures taken to safeguard an informat...
Question 112: You own a small company in a remote industrial area. Lately,...
Question 113: A Dutch company requests to be listed on the American Stock ...