Which of the following would have assured that the bid …
Company A submitted a bid on a contract to do work for Company B via email. Company B was insistent that
the bid did not come from Company A. Which of the following would have assured that the bid was submitted
by Company A?
Which of the following hashing methods would Matt have …
Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message is 160-bits
long. Which of the following hashing methods would Matt have to use to obtain this digital fingerprint?
Which of the following security concepts is Sara using?
Sara, a security administrator, manually hashes all network device configuration files daily and compares them
to the previous days’ hashes. Which of the following security concepts is Sara using?
Which of the following would a security administrator u…
Which of the following would a security administrator use to verify the integrity of a file?
which of the following steps is MOST important?
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-to-peer network
that cannot connect to the Internet. The ISSO can update the antivirus definitions manually, but which of the
following steps is MOST important?
Which of the following should the security administrato…
The security administrator is implementing a malware storage system to archive all malware seen by the
company into a central database. The malware must be categorized and stored based on similarities in the
code. Which of the following should the security administrator use to identify similar malware?
Which of the following concepts describes the use of a …
Which of the following concepts describes the use of a one-way transformation in order to validate the integrity
of a program?
This technique is known as:
A software developer wants to prevent stored passwords from being easily decrypted. When the password is
stored by the application, additional text is added to each password before the password is hashed. This
technique is known as:
which cannot be reversed and converts data into a strin…
Which of the following functions provides an output which cannot be reversed and converts data into a string of
characters?
Which of the following describes how the employee is le…
A security analyst has been notified that trade secrets are being leaked from one of the executives in the
corporation. When reviewing this executive’s laptop, they notice several pictures of the employee’s pets are on
the hard drive and on a cloud storage network. When the analyst hashes the images on the hard drive against
the hashes on the cloud network, they do not match.
Which of the following describes how the employee is leaking these secrets?