1.Which of the following statements about asymmetric-key encryption is correct?
a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties.
b Employees in the same company share the same public key.
c Most companies would like to manage the private keys for their employees.
d Most companies would like to use a Certificate Authority to manage the public keys of their employees.
e Two of the above are correct.
2 Which of the following controls would most likely assure that a company can reconstruct its financial records?
Security controls such as firewalls
Backup data are tested and stored safely
Personnel understand the data very well
Paper records
3.Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?
A message digest.
A 16-bit encryption key.
A public key and a private key.
A digital signature.
4.Which of the following is not one of the main components of vulnerability management and assessment?
Identification.
Remediation.
Internalization.
Maintenance.
5.A Public Key Infrastructure (PKI) provides the ability to do which of the following?
Encrypt messages using a private key.
Enable debit and credit card transactions.
Read plaintext.
Issue, maintain, and revoke digital certificates.
6.Which of the following statements is incorrect about digital signatures?
A digital signature can ensure data integrity.
A digital signature also authenticates the document creator.
A digital signature is an encrypted message digest.
A digital signature is a message digest encrypted using the document creator's public key.