which of the following?
A company has a new offering to provide access to their product from a central location rather than
clients internally hosting the product on the client network. The product contains sensitive corporate
information that should not be accessible from one client to another. This is an example of which of
the following?
Which of the following concepts is enforced by certifying that email communications have been sent by who the
Which of the following concepts is enforced by certifying that email communications have been
sent by who the message says it has been sent by?
Which of the following refers to a network that spans several buildings that are within walking distance of ea
Which of the following refers to a network that spans several buildings that are within walking
distance of each other?
All of the following are valid cryptographic hash functions EXCEPT:
All of the following are valid cryptographic hash functions EXCEPT:
Which of the following protocols was MOST likely used on this cable?
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector.
Which of the following protocols was MOST likely used on this cable?
Which of the following concepts is used by digital signatures to ensure integrity of the data?
Which of the following concepts is used by digital signatures to ensure integrity of the data?
Which of the following describes an IPv6 address of ::1?
Which of the following describes an IPv6 address of ::1?
Which of the following security goals is met by camouflaging data inside of other files?
A security administrator discovers an image file that has several plain text documents hidden in
the file. Which of the following security goals is met by camouflaging data inside of other files?
Which of the following devices would be the MOST cost efficient to use for this backup?
A SQL server needs several terabytes of disk space available to do an uncompressed backup of a
database. Which of the following devices would be the MOST cost efficient to use for this backup?
what was discovered?
A security analyst discovered data such as images and word documents hidden within different
types of files. Which of the following cryptographic concepts describes what was discovered?