Question

In: Computer Science

Question 12 The protection of data from unauthorized modification or destruction is an example of data...

Question 12

The protection of data from unauthorized modification or destruction is an example of data ___________

Question 12 options:

confidentiality

1integrity

availability

authentication

Question 13

In a public key encryption system, any person can encrypt a message using the receiver's ______.

Question 13 options:

public key

private key

Both A and B

Neither A nor B

Question 14

__________ is concerned with protecting student educational records

Question 14 options:

HIPPA

CISO

GLBA

FERPA

Question 15

__________ is the ability to correlate, with high certainty, a recorded action with its originating individual or entity.

Question 15 options:

Authentication

Confidentiality

Integrity

Non-repudiation

Question 16

_______________ requires companies to maintain financial records for seven years.

Question 16 options:

HIPPA

Sarbanes Oxley Act

GLBA

FISMA

Question 17

Which of the following statement is true comparing MANET with infrastructure based WLAN?

Question 17 options:

MANET generally has better performance in term of speed

MANET has less complicated routing mechanism

MANET is more tolerate to single point of failure

WLAN generally supports more flexible network topology

Solutions

Expert Solution

Do comment if further explanation needed

12->  The protection of data from unauthorized modification or destruction is an example of data

Answer: A) confidentiality

This is definition of confidentiality

13-> In a public key encryption system, any person can encrypt a message using the receiver's :

Answer: A) public key

14-> ______is concerned with protecting student educational records:

Answer: D) FERPA

Family Educational Rights and Privacy Act, this act is concerned with protecting student's educational records.

15->  __________ is the ability to correlate, with high certainty, a recorded action with its originating individual or entity.

Answer: c) Integrity

This is what integrity means.

16-> _______________ requires companies to maintain financial records for seven years.

Answer: a) HIPPA

This is HIPPA retention requirement.

17->  Which of the following statement is true comparing MANET with infrastructure based WLAN?

Answer: A) MANET generally has better performance in term of speed.


Related Solutions

A. loss or destruction of general ledger data. B. inaccurate adjusting entries. C. unauthorized adjusting entries....
A. loss or destruction of general ledger data. B. inaccurate adjusting entries. C. unauthorized adjusting entries. D. fraudulent financial reporting. Spreadsheet error protection controls reduce the risk of
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
Question 2: Download the Excel data file "Arlington_Homes" from the folder "Data" under "Chapter 12." a)...
Question 2: Download the Excel data file "Arlington_Homes" from the folder "Data" under "Chapter 12." a) read the data file in R. b) using R, answer question 65 (a, b, and c) on page 411 of your book. Run the regression, show the estimates and test. Write what you are testing using a comment in the R program. Question #65. link for page 411 #65 https://imgur.com/s0SgxP3 please show every step for R frmulas Price Sqft Beds Baths Col 840000 2768...
1.- the protection provided through transfer of antibodies from mother to fetus is an example of...
1.- the protection provided through transfer of antibodies from mother to fetus is an example of active immunity autoimmunity cell-meditate immunity clonal selection passive immunity 2.- in mammalian defenses against invading pathogens, all of these are considered nonspecific defense mechanisms except the inflammatory response acquire immunity mucous membrane the skin 3.- antigens are proteins that consists of two light and two heavy chain polypeptide chains proteins that are not your own proteins on the surface of B-cell membranes proteins on...
Discuss Schumpeter’s concept of creative destruction. Illustrate with an example, or examples, of digital disruption in...
Discuss Schumpeter’s concept of creative destruction. Illustrate with an example, or examples, of digital disruption in a knowledge industry. What are some public policy implications?
1. Which of the following is not an example of a posttranslational modification? A. N-terminal amino...
1. Which of the following is not an example of a posttranslational modification? A. N-terminal amino acid(s) commonly removed or modified B. signal/targeting peptide remova l C. phosphorylation, methylation, acetylation D. Glycosylation E. All of the above are examples of posttranslational modifications 2. The major problem that arises from incorporating incorrect tautomers into a cell’s DNA is that: A. they react with adjacent bases to form dimers. B. they often lead to slippage problems during replication. C. they cannot be...
(TCO 8) Malicious data modification or tampering is an attack against data confidentiality. data integrity. data...
(TCO 8) Malicious data modification or tampering is an attack against data confidentiality. data integrity. data availability. data accountability. Question 105 pts (TCO 9) A threat assessment is a(n) identification of types of threats an organization might be exposed to. systematic rating of threats based upon level of risk and probability. potential level of impact. likelihood of a threat materializing. Question 115 pts (TCO 10) When it comes to HIPAA, which of the following does PHI stand for? Public health...
1- what are radiation protection standards based on (where does the data come from)?
  1- what are radiation protection standards based on (where does the data come from)? 2- What are some of the typical symptoms/injuries from radiation exposure? (ie fatigue, nausea, blood changes are syptoms of radiation sickness whereas, cataracts, cancers, birth defects, etc. are some possible “injuries” from exposure) 3-What type(s) of effects are the radiation protection standards trying to prevent? 4- In general, how do limits for the general public compare to those for occupational exposure?
Watch this video about Joseph Shumpeter's concept of Creative Destruction. For example, many think that the...
Watch this video about Joseph Shumpeter's concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. Discuss in 500 words your opinion on what you think of the disruptive capacity of the gig economy on the labor market. Include at least 3 quotes enclosed in quotation marks and cited in-line by reference to a list at the end. Reply to two peer postings in paragraphs of at least five...
QUESTION 2 (12 marks: 14 minutes)   The selected data below were taken from the comparative trial...
QUESTION 2 (12 marks: 14 minutes)   The selected data below were taken from the comparative trial balances of Airbus Ltd for the year ended 30 June X5:   X5 X4 R R Trade receivable 720 000 800 000 Inventories 280 000 200 000 Property, plant and equipment 1 200 000 1 000 000 Accumulated depreciation 210 000 200 000 Stationery on hand 12 000 10 000 Trade payable (for inventory) 420 000 400 000 Other accrued liabilities ( for other operating...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT