Which of the following can be used for both encryption and digital signatures?
Which of the following can be used for both encryption and digital signatures?
Which of the following is being used by the certificate authority in this exchange?
A user tries to visit a web site with a revoked certificate. In the background a server from the
certificate authority only sends the browser revocation information about the domain the user is
visiting. Which of the following is being used by the certificate authority in this exchange?
Which of the following is Joe trying to achieve?
Joe wants to employ MD5 hashing on the company file server. Which of the following is Joe trying
to achieve?
Which of the following choices BEST mitigates the security risk of public web surfing?
By hijacking unencrypted cookies an application allows an attacker to take over existing web
sessions that do not use SSL or end to end encryption. Which of the following choices BEST
mitigates the security risk of public web surfing? (Select TWO)
Which of the following encryptions needs BOTH of these needs?
The security administration team at a company has been tasked with implementing a data-at-rest
solution for its company storage. Due to the large amount of storage the Chief Information Officer
(CISO) decides that a 128-bit cipher is needed but the CISO also does not want to degrade
system performance any more than necessary. Which of the following encryptions needs BOTH of
these needs?
which of the following poses the greatest security issues?
A company has a BYOD policy that includes tablets and smart phones. In the case of a legal
investigation, which of the following poses the greatest security issues?
Which of the following is the primary focus?
After several thefts a Chief Executive Officer (CEO) wants to ensure unauthorized do not have to
corporate grounds or its employees. The CEO just approved new budget line items for fences,
lighting, locks and CCTVs. Which of the following is the primary focus?
Which of the following steps in incident response procedures entails of the incident and identification of kno
Which of the following steps in incident response procedures entails of the incident and
identification of knowledge gained that can be applied to future handling of incidents?
Which of the following automated or semi-automated software testing techniques relies on inputting large amoun
Which of the following automated or semi-automated software testing techniques relies on
inputting large amounts of random data to detect coding errors or application loopholes?
Which of the following concerns will MOST affect the decision to use a personal device to receive company emai
A company’s BYOD policy requires the installation of a company provide mobile agent on their on
their personally owned devices which would allow auditing when an employee wants to connect a
device to the corporate email system. Which of the following concerns will MOST affect the
decision to use a personal device to receive company email?