Which of the following is MOST appropriate to use?
A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer
will have very different job requirements and use unique tools and applications in their job. Which of the
following is MOST appropriate to use?
Which of the following should be modified to assure that Ann has read access to the file?
A file on a Linux server has default permissions of rw-rw-r–. The system administrator has verified that
Ann, a user, is not a member of the group owner of the file. Which of the following should be modified to
assure that Ann has read access to the file?
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key
Which of the following protocols uses an asymmetric key to open a session and then establishes a
symmetric key for the remainder of the session?
Which of the following types of cryptography is being used here for the key exchange?
A company uses PGP to ensure that sensitive email is protected. Which of the following types of
cryptography is being used here for the key exchange?
Which of the following is true about asymmetric encryption?
Which of the following is true about asymmetric encryption?
Encryption used by RADIUS is BEST described as:
Encryption used by RADIUS is BEST described as:
Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.
Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.
Which of the following is another name for this symmetric key?
Users need to exchange a shared secret to begin communicating securely. Which of the following is
another name for this symmetric key?
which of the following when sending an email to a recipient for the first time?
In order to securely communicate using PGP, the sender of an email must do which of the following when
sending an email to a recipient for the first time?
Which of the following has Sara selected?
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which
will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara
selected?