The consultants at Smith Consultants Inc. work on laptops that are protected by asymmetrical
cryptography. To keep the management of the keys cheap, all consultants use the same key pair.
What is the companys risk if they operate in this manner?
If the private key becomes known all laptops must be supplied with new keys.
If the Public Key Infrastructure (PKI) becomes known all laptops must be supplied with new
keys.
If the public key becomes known all laptops must be supplied with new keys.
What is a repressive measure in the case of a fire?
Taking out fire insurance
Putting out a fire after it has been detected by a fire detector
Repairing damage caused by the fire
What is the objective of classifying information?
Authorizing the use of an information system
Creating a label that indicates how confidential the information is
Defining different levels of sensitivity into which information may be arranged
Displaying on the document who is permitted access
What do employees need to know to report a security incident?
How to report an incident and to whom.
Whether the incident has occurred before and what was the resulting damage.
The measures that should have been taken to prevent the incident in the first place.
Who is responsible for the incident and whether it was intentional.