Question
1. What are the conditions for a fraud to be perpetrated? A. Intelligence B. Ethics C. Rationalization D. Opportunity 2. Select correct statements about encryption.
1. What are the conditions for a fraud to be perpetrated?
A. Intelligence
B. Ethics
C. Rationalization
D. Opportunity
2. Select correct statements about encryption.
| A. | Encryption is a preventive control. |
| B. | We use symmetric-key encryption method to ensure the identity of e-business trading partners. |
| C. | Encryption is an approach to ensure confidentiality. |
| D. | Asymmetric key encryption method is faster than symmetric key encryption method. |
3. When using asymmetric-key encryption method in conducting an electronic transaction, the two trading partners will need a total of two keys.
True
False
4. Select correct statements.
| A. | Digital signature is an image of a user's signature. |
| B. | To conduct e-business, each trading party has many digital signatures. |
| C. | We use digital signatures to ensure data integrity. |
| D. | We use a digital signature to authenticate a document's creator. |
5. How can we achieve authentication in conducting e-business?
| A. | Use hashing algorithms |
| B. | Use one-key encryption method |
| C. | Use digital signatures |
| D. | Use two-key encryption method |
6. Which of the following control activities are corrective control?
| A. | Disaster recovery planning |
| B. | Back up |
| C. | Independent verification |
| D. | Access control |
| E. | Input control |
| F. | Business continuity management |
7. Compare and contrast between encryption and hashing. Choose correct answers.
| A. | The purpose of hashing is to ensure data privacy. |
| B. | Hashed document is no longer readable. |
| C. | To reverse the hashing process, we will need a key called SHA-256. |
| D. | Encrypted documents can be decrypted. |
8. What are the goals of information security management?
| A. | Availability |
| B. | Data integrity |
| C. | Authentication |
| D. | Encryption |
9. Select correct statements.
| A. | Asymmetric-key encryption method is good for authentication. |
| B. | Asymmetric-key encryption method is a must for today's electronic business to business models. |
| C. | Symmetric-key encryption method has issues with key management. |
| D. | Symmetric-key encryption method has issues with key distribution. |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started