Questions
Now it's time to check your knowledge. Select the best response, then check your answers with those found in the Assessment section at the end of the book:
- The _____ outlines the various hash algorithms that are considered to be secure to used when creating a message digest and all in the Secure Hash Algorithm (SHA) family.
a. AES
b. SHS
c. PCI DSS
d. SSL
- _____ specifies the controls that must be in place to securely handle credit card data.
a. AES
b. SHS
c. PCI DSS
d. SSL
- _____ is a law that outlines rigorous requirements for anyone dealing with patient information.
a. e-PHI
b. PCI DSS
c. GDPR
d. HIPAA
- In 2018, the EU enacted the _____, which outlines specific requirements on how consumer data is protected.
a. e-PHI
b. PCI DSS
c. GDPR
d. HIPAA
- _____ is a form of malware that holds data hostage until a payment or ransom is paid.
a. Ransomware
b. Clipper Chip
c. PGP
d. e-PHI
- Almost all voice traffic is digitized and transmitted over the internet using _____...