IS4550 CHAPTER 11 Flashcards
A process that performs a sequence of operations is called ___.
ALGORITHM
Provides services for an application program to ensure effective communication is called ___.
APPLICATION LAYER
Documenting rules, procedures, and guidelines to be tested against a system is called ___.
ASSESSMENT
A normal level of measurement is called ___.
BASELINE
Activities that occur between two or more businesses is called ___.
BUSINESS TO BUSINESS (B2B)
Activities that occur between a business and a customer is called ___.
BUSINESS TO CUSTOMERS (B2C)
Network components that interconnect network nodes or hosts is called ___.
DATA-LINK LAYER
A data structure used to bind an authenticated individual to a public key is called ___.
DIGITAL CERTIFICATE
Provides services for connecting network resources across network domains is called ___.
INTERNET LAYER
The encryption key that is held privately by the user is called ___.
PRIVATE KEY
This used to communicate with the private and is publicly available and is called ___.
PUBLIC KEY
Methods and protocols for encapsulating application data is called ___.
TRANSPORT LAYER
- E-commerce and banking sites should have no encryption enabled because that communist ion between the two points is already protected via the user ID.
TRUE OR FALSE
FALSE
- ___ is the largest developer and publisher of international standards.
ISO
- Intranets are extensions of the corporate network for business partners and customers.
TRUE OR FALSE
FALSE
- Which of the following indicates you are using a secure Web site? (Select two)
- Web address starts with “shttp”
- Web address starts with “https”
- Padlock icon
- Key icon
Web address starts with “https”
Padlock icon
- Which of the following are characteristics of Web 2.0? (Select three)
- Encryption
- Wikis
- Blogs
- Secure Web sites
- Social media Web sites
Wikis
Blogs
Social media Web sites
- Which organization develops RFCs?
- NIST
- FISMA
- ISO
- IETF
IETF
- ____ is a body of the US government that provides standards for financial institutions.
FFEIC/Federal Financial Institutions Examinations Council
- E-commerce implementation using SSL should use a minimum of ___-bit encryption.
128
- What is a trusted source for an SSL certificate called?
- Trusted certificate
- Trusted authority
- Certificate authority
- Certificate trusted
Certificate authority
- ___ sets the FISMA standards for the federal IT systems.
NIST