Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?
Which of the following cryptographic algorithm uses public key and private key to encrypt or
decrypt data ?
Which of the following will you tell her to use to protect her computer?
Sonya, a user, reports that she works in an electrically unstable environment where brownouts are
a regular occurrence. Which of the following will you tell her to use to protect her computer?
Which of the following risk management techniques is your company using?
Your company is covered under a liability insurance policy, which provides various liability
coverage for information security risks, including any physical damage of assets, hacking attacks,
etc. Which of the following risk management techniques is your company using?
what will be your answer for her question?
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited
personnel in the field of security management. She is giving a tutorial on DRP. She explains that
the major goal of a disaster recovery plan is to provide an organized way to make decisions if a
disruptive event occurs and asks for the other objectives of the DRP. If you are among some of
the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each
correct answer represents a part of the solution. Choose three.
Which of the following will you configure on the network to perform the given task?
You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security
reasons. The manager of the company tells you to establish connectivity between clients and
servers of the network which prevents eavesdropping and tampering of data on the Internet.
Which of the following will you configure on the network to perform the given task?
Which of the following services are offered by the administrative physical security control group?
The security controls that are implemented to manage physical security are divided in various
groups. Which of the following services are offered by the administrative physical security control
group? Each correct answer represents a part of the solution. Choose all that apply.
Which of the following will she use to accomplish the task?
Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the
presentation. Which of the following will she use to accomplish the task?