100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
INMT 341 FINAL EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS $12.39   Add to cart

Exam (elaborations)

INMT 341 FINAL EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS

 4 views  0 purchase
  • Course
  • INMT 341
  • Institution
  • INMT 341

INMT 341 FINAL EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS Encryption - Answer-The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext). Plain text - Answer-digital inform...

[Show more]

Preview 2 out of 12  pages

  • October 24, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • inmt 341
  • INMT 341
  • INMT 341
avatar-seller
victoryguide
INMT 341 FINAL EXAM QUESTIONS
WITH CORRECT DETAILED
ANSWERS
Encryption - Answer-The process of taking an unencrypted message (plaintext),
applying a mathematical function to it (encryption algorithm with a key) and producing
an encrypted message (ciphertext).

Plain text - Answer-digital information that a user can read

Ciphertext - Answer-digital information unintelligible to a user

Cipher - Answer-An algorithm to perform encryption

Algorithm - Answer-a procedure or formula for solving a problem, based on performing
a sequence of specified actions

Key - Answer-a key is a variable value that is applied using an algorithm to a string or
block of unencrypted text to produce encrypted text, or to decrypt encrypted text

Encryption Key - Answer-A piece of information, in a digitized form, used by an
encryption algorithm to convert the plaintext to the ciphertext

Key length - Answer-The size of the encryption key measured in bits - 256 is the
standard!!!!!

Decryption - Answer-A technique used to recover the original plaintext from the
ciphertext so that it is intelligible to the reader

Symmetric Key Encryption - Answer-The trading partners use the same key for both
encryption and decryption.

Asymmetric (public key) Encryption - Answer-uses a public and private key to encrypt
and decrypt messages - used for digital signatures

Data Encryption Standard - Answer-outdated symmetric key method of data encryption;
aka same key is no longer good enough

Advanced Encryption Standard - Answer-asymmetric key block cipher standard; 128-
256 bits

, public key infrastructure (PKI) - Answer-supports the distribution and identification of
public encryption keys, enabling users and computers to both securely exchange data
over networks such as the Internet and verify the identity of the other party

Digital Certificate - Answer-is used to verify the trustworthiness of a website

Certificate Authority - Answer-a trusted third party that issues electronic digital
certificates to verify a digital entity's identity on the Internet

Digital Signature - Answer-a mathematical technique used to validate the authenticity
and integrity of a message, software or digital document
- using PRIVATE KEY
- they are hashed then use a key for encryption

Hash Function - Answer-An algorithm that maps or translates one set of bits into
another (generally smaller) so that a message yields the same result every time the
algorithm is executed using the same message as input

*virtually impossible to reverse a hash

What kind of control is encryption? - Answer-preventative and detective

2. Disaster Recovery Plans - Answer-a set of human, physical, technical and procedural
resources to recover in case of disaster

Cold Site - Answer-an IS backup facility but lacks computer equipment

Hot Site - Answer-fully operational backup facility with hardware and software

Business Continuity Plan - Answer-plan that will be executed in case of emergency to
recover and resume quickly

Full Backup - Answer-a complete copy of all the data

Differential Backup - Answer-backs up all new data since last FULL BACKUP

Incremental Backup - Answer-backs up all new data since last INCREMENTAL
BACKUP

Recovery Time Objective - Answer-how long can an app be down before significantly
damaging the business

Recovery Point Objective - Answer-how much data can be lost before significantly
damaging the business

2 Parts of Disaster Plans - Answer-1. Backups

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller victoryguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.39. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.39
  • (0)
  Add to cart