Which of the following protocols provides the highest level of VPN security with a VPN connection that uses th
Which of the following protocols provides the highest level of VPN security with a VPN connection
that uses the L2TP protocol?
Which of the following encryption methods comes under symmetric encryption algorithm?
Which of the following encryption methods comes under symmetric encryption algorithm? Each
correct answer represents a complete solution. Choose three.
Which of the following uses public key cryptography to encrypt the contents of files?
Which of the following uses public key cryptography to encrypt the contents of files?
which of the following categories can you deploy the access control?
An access control secures the confidentiality, integrity, and availability of the information and data
of an organization. In which of the following categories can you deploy the access control? Each
correct answer represents a part of the solution. Choose all that apply.
Which of the following would protect against this?
You are the Network Administrator for a bank. In addition to the usual security issues, you are
concerned that your customers could be the victim of phishing attacks that use fake bank Web
sites. Which of the following would protect against this?
What type of algorithm is this?
You are responsible for security at a defense contracting firm. You are evaluating various possible
encryption algorithms to use. One of the algorithms you are examining is not integer based, uses
shorter keys, and is public key based. What type of algorithm is this?
Which of the following formulas best describes the Single Loss Expectancy (SLE)?
Single Loss Expectancy (SLE) represents an organization’s loss from a single threat. Which of the
following formulas best describes the Single Loss Expectancy (SLE)?
Which of the following are man-made threats that an organization faces?
Which of the following are man-made threats that an organization faces? Each correct answer
represents a complete solution. Choose three.
Which of the following methods for identifying appropriate BIA interviewees’ includes examining the orga
Which of the following methods for identifying appropriate BIA interviewees’ includes examining
the organizational chart of the enterprise to understand the functional positions?
Which of the following describes the acceptable amount of data loss measured in time?
Which of the following describes the acceptable amount of data loss measured in time?