Which of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:December 23, 2021
  • Reading time:2 mins read

Which of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message? Encrypting first by receiver's private key and second by sender's public key Encrypting first…

Continue ReadingWhich of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message?

The PRIMARY reason for classifying assets is to:

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:December 23, 2021
  • Reading time:1 mins read

The PRIMARY reason for classifying assets is to: balance asset value and protection measures.  identify low-value assets with insufficient controls. establish clear lines of authority and ownership for the asset.…

Continue ReadingThe PRIMARY reason for classifying assets is to:

The MAIN goal of an information security strategic plan is to:

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:December 23, 2021
  • Reading time:1 mins read

The MAIN goal of an information security strategic plan is to: develop a risk assessment plan. develop a data protection plan. protect information assets and resources. establish security governance. Explanation:…

Continue ReadingThe MAIN goal of an information security strategic plan is to:

Which of the following is a key area of the ISO 27001 framework?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:December 23, 2021
  • Reading time:1 mins read

Which of the following is a key area of the ISO 27001 framework? Operational risk assessment Financial crime metrics Capacity management Business continuity management Explanation: Operational risk assessment, financial crime…

Continue ReadingWhich of the following is a key area of the ISO 27001 framework?