Which of the following will Joe need to use to BEST acc…
Joe must send Ann a message and provide Ann with assurance that he was the actual sender. Which of the
following will Joe need to use to BEST accomplish the objective?
Which of the following did the developer MOST likely im…
A new client application developer wants to ensure that the encrypted passwords that are stored in their
database are secure from cracking attempts. To implement this, the developer implements a function on the
client application that hashes passwords thousands of times prior to being sent to the database. Which of the
following did the developer MOST likely implement?
Which of the following represents a cryptographic solut…
Which of the following represents a cryptographic solution where the encrypted stream cannot be captured by a
sniffer without the integrity of the stream being compromised?
Which of the following would be the BEST option?
A small company wants to employ PKI. The company wants a cost effective solution that must be simple and
trusted. They are considering two options: X.509 and PGP. Which of the following would be the BEST option?
which of the following should be used for transmitting …
When confidentiality is the primary concern, and a secure channel for key exchange is not available, which of
the following should be used for transmitting company documents?
Which of the following can the technician use to verify…
A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of
the following can the technician use to verify if a system file was compromised? (Choose two.)
Which of the following technologies provides the FASTES…
A company is concerned that a compromised certificate may result in a man-in-the-middle attack against
backend financial servers. In order to minimize the amount of time a compromised certificate would be
accepted by other servers, the company decides to add another validation step to SSL/TLS connections. Which
of the following technologies provides the FASTEST revocation capability?
Which of the following is this an example of?
Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program that encrypted
the whole hard drive. Once the hard drive is fully encrypted, he uses the same program to create a hiddenvolume within the encrypted hard drive and stores the sensitive information within the hidden volume.
Which of the following is this an example of? (Choose two.)
Which of the following methods would achieve this goal?
A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication and the
files the user is sending using only a user ID and a key pair. Which of the following methods would achieve this
goal?
Which of the following can the administrator do to decr…
A security administrator at a company which implements key escrow and symmetric encryption only, needs to
decrypt an employee’s file. The employee refuses to provide the decryption key to the file. Which of the
following can the administrator do to decrypt the file?