Which of the following algorithms with transport encryp…
Recent data loss on financial servers due to security breaches forced the system administrator to harden their
systems. Which of the following algorithms with transport encryption would be implemented to provide the
MOST secure web connections to manage and access these servers?
Which of the following cryptographic related browser se…
Which of the following cryptographic related browser settings allows an organization to communicate securely?
Which of the following protocols is the security admini…
Which of the following protocols is the security administrator observing in this packet capture?
12:33:43, SRC 192.168.4.3:3389, DST 10.67.33.20:8080, SYN/ACK
Which of the following algorithms has well documented c…
Which of the following algorithms has well documented collisions? (Choose two.)
Which of the following offers the LEAST secure encrypti…
Which of the following offers the LEAST secure encryption capabilities?
Which of the following authenticate connections using p…
Which of the following authenticate connections using point-to-point protocol? (Choose two.)
Which of the following choose to provide both CRC integ…
An administrator has two servers and wants them to communicate with each other using a secure algorithm.
Which of the following choose to provide both CRC integrity checks and RCA encryption?
Which of the following implements the required secure k…
A security administrator must implement a system to allow clients to securely negotiate encryption keys with the
company’s server over a public unencrypted communication channel.
Which of the following implements the required secure key negotiation? (Choose two.)
which of the following should the end user protect from…
When using PGP, which of the following should the end user protect from compromise? (Choose two.)
Which of the following should Jane select for the tunne…
Jane, a VPN administrator, was asked to implement an encryption cipher with a MINIMUM effective security of
128-bits. Which of the following should Jane select for the tunnel encryption?