Which of the following symmetric key algorithms are examples of block ciphers?
Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE).
Which of the following physical security controls prevents an attacker from gaining access to a network closet
Which of the following physical security controls prevents an attacker from gaining access to a
network closet?
Which of the following should be used when a business needs a block cipher with minimal key size for internal
Which of the following should be used when a business needs a block cipher with minimal key
size for internal encryption?
which of following threats?
A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?
Which of the following ciphers offers strong encryption with the FASTEST speed?
Sara, a security engineer, is testing encryption ciphers for performance. Which of the following
ciphers offers strong encryption with the FASTEST speed?
Which of the following would the technician MOST likely configure?
A technician is setting up a computer lab. Computers on the same subnet need to communicate with
each other using peer to peer communication. Which of the following would the technician MOST
likely configure?
Which of the following should Jane select for the tunnel encryption?
Jane, a VPN administrator, was asked to implement an encryption cipher with a MINIMUM
effective security of 128-bits. Which of the following should Jane select for the tunnel encryption?
Which of the following concepts are MOST important for a company’s long term health in the event of a di
Which of the following concepts are MOST important for a company’s long term health in the event
of a disaster? (Select TWO).
which of the following should the end user protect from compromise?
When using PGP, which of the following should the end user protect from compromise? (Select
TWO).
Which of the following standards should be consulted?
A technician needs to ensure that new systems are protected from electronic snooping of Radio
Frequency emanations. Which of the following standards should be consulted?