?Identify the letters of the choices that best match the phrases or definitions.

A. ?Uses a single key to encrypt and decrypt information
B. ?An asymmetric kind of encryption
C. ?Combination of hardware and software that allows computers to interact with a network
D. ?Might include company hardware, software, data, networks, people, or procedures
E. ?A risk control strategy that reduces the impact of a risk by careful planning and preparation
F. ?A risk control strategy that shifts risks to another asset or party
G. ?Hostile act that targets systems or a company itself
H. ?Protects the system and keeps it safe, free from danger, and reliable
I. ?Records everything that is typed into the keyboard, including passwords, while the system continues to function normally
J. ?Uses analytical techniques to identify potential quality and performance improvements in an information system


A. ?Private key encryption
B. ?Public key encryption
C. ?Network interface
D. ?Asset
E. ?Mitigation
F. ?Transference
G. ?Attack
H. ?Security
I. ?Keystroke logger
J. Software reengineering

Computer Science & Information Technology

You might also like to view...

Which of the following are true of the Model-View-Controller pattern?

a. This pattern is useful in designing a GUI (graphical user interface). b. This pattern is useful only in designing end-user computer applications. It is of little value otherwise. c. This pattern presents a way to separate (at least logically) I/O from the process part of the application. d. In this pattern, the Controller is the input portion of the task. e. In this pattern, the View is the input portion of the task. f. In this pattern, the Controller accepts data and commands from the user, it sends the to the Model. The Model processes commands, operates on the data, and changes the state of the program, notifies the View. The View presents the state of the program.

Computer Science & Information Technology

What is continuum?

What will be an ideal response?

Computer Science & Information Technology

________ is not generally considered one of the most important objectives in scheduler design.

a) Avoiding indefinite postponement b) Minimizing overhead c) Enforcing priorities d) Maximizing throughput

Computer Science & Information Technology

What is a supply chain and why is it critical to understand that it needs to be secured?

What will be an ideal response?

Computer Science & Information Technology