Complete Academic Review & Study Resource update
2025/2026
Define accountability and its benefits - correct answer nonrepudiation,
deterrence, intrusion detection and prevention, and admissibility of records
Auditing - correct answer Hold users of your system accountable. A
methodical examination and review of an organization's records.
nonrepudiation measures - correct answer make it so that someone can't
send an email and then deny sending it. usually with a digital signature.
Which standards apply to any financial entity policies? - correct answer
Gramm-Leech-Bliley
Which standards apply to publicly traded companies doing business in the
U.S? - correct answer Sarbanes-Oxley Act (SOX)
Which standards apply to credit card industry? - correct answer PCI DSS
Which characteristic falls under accountability? - correct answer Identity
What company audits other companies for licensing requirements? - correct
answer BSA
Define cryptography, including its origins and influencers. - correct answer
The science of protecting the confidentiality and integrity of data
, symmetric key cryptography - correct answer the sender and receiver use
the same key for encryption and decryption
Asymmetric Key Cryptography - correct answer Encryption that uses two
separate keys- a public key and a private key. Advantage is that you can post
the public key and anyone can send you an encrypted message.
Hash functions - correct answer mathematical algorithms that generate a
message summary or digest (sometimes called a fingerprint) to confirm
message identity and integrity
digital signature - correct answer a means of electronically signing a
document with data that cannot be forged
Digital certificate - correct answer Link a public key to an individual
Protecting data at rest - correct answer use encryption and physical security
Protecting data in motion - correct answer use encryption, protect the
connection with a VPN,
Protecting data in use - correct answer We are somewhat limited in our
ability to protect data while it is being used by those who legitimately have
access to it. Authorized users can print files, move them to other machines or
storage devices, etc.
Rivest-Shamir-Adleman - correct answer encryption algorithm
Which term is synonymous with symmetric cryptography? - correct answer
Secret key cryptography