Which of the following is true about input validation in a client-server architecture, when data integrity is
Which of the following is true about input validation in a client-server architecture, when data
integrity is critical to the organization?
Which of the following BEST protects the credit card data?
A merchant acquirer has the need to store credit card numbers in a transactional database in a
high performance environment. Which of the following BEST protects the credit card data?
which will improve in-transit protection of transactional data?
A bank has a fleet of aging payment terminals used by merchants for transactional processing.
The terminals currently support single DES but require an upgrade in order to be compliant with
security standards. Which of the following is likely to be the simplest upgrade to the aging
terminals which will improve in-transit protection of transactional data?
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI
model?
Which of the following is BEST used to capture and analyze network traffic between hosts on the same network s
Which of the following is BEST used to capture and analyze network traffic between hosts on the
same network segment?
Which of the following would be MOST effective in reducing data leaks in this situation?
After a number of highly publicized and embarrassing customer data leaks as a result of social
engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will
reduce the risk of another data leak. Which of the following would be MOST effective in reducing
data leaks in this situation?
which cannot be reversed and converts data into a string of characters?
Which of the following functions provides an output which cannot be reversed and converts data
into a string of characters?
Which of the following encrypts data a single bit at a time?
Which of the following encrypts data a single bit at a time?
Which of the following is used to verify data integrity?
Which of the following is used to verify data integrity?
which of the following uses TCP port 22?
By default, which of the following uses TCP port 22? (Select THREE).