Which of the following is a useful security mechanism when considering business
strategy and IT?
a. Encryption
b. Decryption
c. firewall
d. all the above

1 Answer

Answer :

d. all the above

Related questions

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : Explain encryption and decryption. -Technology

Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature

Last Answer : c. Wallets

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above

Last Answer : a. Encryption

Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies

Last Answer : c) Firewall

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : Encryption can be done A. only on textual data B. only on ASCII coded data C. on any bit string D. only on mnemonic data

Last Answer : C. on any bit string

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : The strategy of applying different price vleves for different customers or situation is known as ______. a) Dynamic pricing b) Online bidding c) Direct marketing d) Agent e-business model

Last Answer : a) Dynamic pricing

Description : The________is a blueprint that links the firms e- business strategy with technologty driven marketing strategies. a) E-marketing plan b) Business model c) Situation analysis d) Strategic plan

Last Answer : a) E-marketing plan

Description : ________is the subset of e-commerce focused on transaction. a) E-business b) E-marketing c) Digital technology d) Environment, strategy, performance(ESP)

Last Answer : d) Environment, strategy, performance(ESP)

Description : Considering non personal communication channels, social networking sites, email and company websites are considered as a) Broadcast media b) Display media c) Online media d) Print media

Last Answer : c) Online media

Description : Which is the best encryption mechanism?

Last Answer : Tripple DES is a bit outdated. (DES itself has been around since the sixties). A modern laptop probably has the computational power to break it. A better choice would be AES but I tend to use twofish because I like the name. Don’t know enough about the other to make a recomendation. Sorry.

Description : When a company strives to appeal to multiple well defined market segments with a strategy tailored to each segment, it is applying a. undifferentiated marketing b. differentiated marketing c. concentrated marketing d. the majority fallacy

Last Answer : b. differentiated marketing

Description : The strategy of offering a different product charging a different price and using different promotion and distribution process is called a) Market segmentation b) Market Penetration c) Market Developmentd) None of these

Last Answer : a) Market segmentation

Description : World Bank launched ‘Gender mainstreaming strategy’ in [A] 2000 [B] 2010 [C] 2001 [D] 2002

Last Answer : [C] 2001

Description : Communication is a: A. Strategy B. Theory C. Process D. None of these

Last Answer : C. Process

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : The establishment of the overall audit strategy involves a. Determining the characteristics of the engagement that defines its scope. b. Ascertaining the reporting objectives of the engagement to plan the timing ... will determine the focus of the engagement team's efforts. d. All of the answers

Last Answer : All of the answers

Description : The establishment of an overall audit strategy involves I. Determining the characteristics of the engagement that define its scope. II. Ascertaining the reporting objectives of the engagement to plan the timing of the audit and the ... II only b. I and III only c. II and III only d. I, II, and III

Last Answer : I, II, and III

Description : Mr. Singh has decided to expand his store hours and offer discounted pricing on his existing line of pet supplies. Which strategy is he considering? A. Market penetration B. Diversification C. Product development D. Promotions

Last Answer : Market penetration

Description : Mr. Singh has decided to expand his store hours and offer discounted pricing on his existing line of pet supplies. Which strategy is he considering? A. Market penetration B. Diversification C. Product development D. Promotions

Last Answer : Market penetration

Description : Jenkins is a small retail chain in South Wales. When considering changes in its marketing strategy, the firm's management looks only at changes in shopper attitudes and spending patterns. With ... )passive and proactive B)aggressive and proactive C)dominant and proactive D)passive and reactive

Last Answer : D)passive and reactive

Description : Experienced PC security enthusiasts: What AV/Firewall/Spyware combo have you found to offer the best protection?

Last Answer : I use PCTools Firewall and AntiVirus, as well as ThreatFire and Ad-Aware. So far so good. I’ve been through dozens of FW and AV programs, and I could easily tell you which ones DON’T work. Anything made/sold/offered by Symantec

Description : I found this in the Package Rules menu:

Last Answer : answer:

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software