Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 1 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSA |
1 |
What is the purpose of risk management? |
|
ETSA1 |
2 |
Outline the risk management process. |
|
ETSA2 |
3 |
Q1 - How do you define business continuity? Q2 - Identify the two basic types of controls for management. |
|
ETSA3 |
4 |
Identify the basic IT security risks |
|
ETSA4 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 2 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSB |
1 |
Identify the major classes of preventive IT risk controls with examples |
|
ETSB1 |
2 |
Identify the major classes of corrective IT risk controls with examples |
|
ETSB2 |
3 |
Q1- Identify management preventive IT risk controls. Q2- Identify technical preventive IT risk controls. |
Manage = management. Prevent = preventive. Tech = technical. |
ETSB3 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 3 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSC |
1 |
What is identity theft and what might be the consequences? |
|
ETSC1 |
2 |
What is identity fraud and what might be the consequences? |
|
ETSC2 |
3 |
How does denial of service affect e-commerce |
|
ETSC3 |
4 |
What is a ‘forensic investigation’? |
|
ETSC4 |
5 |
What are the three main security objectives? |
|
ETSC5 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 4 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSD |
1 |
Name some secondary security objectives |
|
ETSD1 |
2 |
What is non-repudiation ? |
|
ETSD2 |
3 |
How is information integrity protected? |
|
ETSD3 |
4 |
How is information confidentiality protected? |
|
ETSD4 |
5 |
What is symmetric encryption? |
|
ETSD5 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 5 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSE |
1 |
What is asymmetric encryption? |
4 = for, 2 = to, B = be |
ETSE1 |
2 |
What is hashing? |
|
ETSE2 |
3 |
What is a digital signature? |
|
ETSE3 |
4 |
What is digital certificate used for? |
|
ETSE4 |
5 |
What is a certification authority? |
|
ETSE5 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 6 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSF |
1 |
What is a firewall in an enterprise networking? |
|
ETSF1 |
2 |
Q1- What does a firewall do? Q2- How does a firewall protect against viruses? |
|
ETSF2 |
3 |
What is meant by “trust” in e-commerce? |
|
ETSF3 |
4 |
What types of products does Veri-Sign provide? |
|
ETSF4 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 7 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSG |
1 |
What are the Internet risks to customers? |
|
ETSG1 |
2 |
What are the Internet risks to selling agents? |
|
ETSG2 |
3 |
What is a denial of service attack? |
|
ETSG3 |
4 |
What is a virus? |
|
ETSG4 |
5 |
Identify three disaster recovery plan objectives. |
|
ETSG5 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 8 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSH |
1 |
What is e-mail spoofing? |
|
ETSH1 |
2 |
What is a Trojan horse? |
|
ETSH2 |
3 |
What is a buffer overflow? |
|
ETSH3 |
4 |
What security technique us used to ensure confidentiality for business use? |
|
ETSH4 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |
ALL
|
Group 9 |
Code for group and ALL messages in this group at 0.50 cents for the 1st msg and 0.30 cents for all other messages---> |
ETSi |
1 |
What is message integrity? |
|
ETSi1 |
2 |
Discuss two security techniques for ensuring message integrity. |
|
ETSi2 |
3 |
List four security techniques for ensuring authentication. |
|
ETSi3 |
4 |
List four security techniques for ensuring non-repudiation. |
|
ETSi4 |
Message # |
Message Description |
Abbreviations used in the message |
TXT this code to 396 |