Which of the following is a feature that is UNIQUE to K…
A security administrator is evaluating three different services: radius, diameter, and Kerberos. Which of the
following is a feature that is UNIQUE to Kerberos?
Which of the following is an encryption algorithm that …
A security administrator has been asked to implement a VPN that will support remote access over IPSEC.
Which of the following is an encryption algorithm that would meet this requirement?
Which of the following is commonly used for federated i…
Which of the following is commonly used for federated identity management across multiple organizations?
which of the following?
The process of applying a salt and cryptographic hash to a password then repeating the process many times is
known as which of the following?
Which of the following controls can be implemented to m…
Joe, a website administrator, believes he owns the intellectual property for a company invention and has been
replacing image files on the company’s public facing website in the DMZ. Joe is using steganography to hidestolen data. Which of the following controls can be implemented to mitigate this type of inside threat?
Which of the following capabilities would be MOST appro…
An information system owner has supplied a new requirement to the development team that calls for increased
non-repudiation within the application. After undergoing several audits, the owner determined that current levels
of non-repudiation were insufficient. Which of the following capabilities would be MOST appropriate to consider
implementing is response to the new requirement?
Which of the following can be implemented to enable use…
Two users need to securely share encrypted files via email. Company policy prohibits users from sharing
credentials or exchanging encryption keys. Which of the following can be implemented to enable users to share
encrypted data while abiding by company policies?
Which of the following technical control should Joe put…
Joe notices there are several user accounts on the local network generating spam with embedded malicious
code. Which of the following technical control should Joe put in place to BEST reduce these incidents?
Which of the following risk management strategies BEST …
A product manager is concerned about continuing operations at a facility located in a region undergoing
significant political unrest. After consulting with senior management, a decision is made to suspend operations
at the facility until the situation stabilizes. Which of the following risk management strategies BEST describes
management’s response?
Which of the following should the organization implemen…
A new security policy in an organization requires that all file transfers within the organization be completed using
applications that provide secure transfer. Currently, the organization uses FTP and HTTP to transfer files.
Which of the following should the organization implement in order to be compliant with the new policy?