which of the following?
The concept of rendering data passing between two points over an IP based network impervious to all
but the most sophisticated advanced persistent threats is BEST categorized as which of the following?
Which of the following transportation encryption protocols should be used to ensure maximum security between a
Which of the following transportation encryption protocols should be used to ensure maximum security
between a web browser and a web server?
Which of the following ports should be opened on a firewall to allow for NetBIOS communication?
Which of the following ports should be opened on a firewall to allow for NetBIOS communication? (Select
TWO).
Which of the following concepts is enforced by certifying that email communications have been sent by who the
Which of the following concepts is enforced by certifying that email communications have been sent by
who the message says it has been sent by?
All of the following are valid cryptographic hash functions EXCEPT:
All of the following are valid cryptographic hash functions EXCEPT:
Which of the following concepts is used by digital signatures to ensure integrity of the data?
Which of the following concepts is used by digital signatures to ensure integrity of the data?
Which of the following security goals is met by camouflaging data inside of other files?
A security administrator discovers an image file that has several plain text documents hidden in the file.
Which of the following security goals is met by camouflaging data inside of other files?
what was discovered?
A security analyst discovered data such as images and word documents hidden within different types of
files. Which of the following cryptographic concepts describes what was discovered?
Which of the following must a user implement if they want to send a secret message to a coworker by embedding
Which of the following must a user implement if they want to send a secret message to a coworker by
embedding it within an image?
Which of the following can hide confidential or malicious data in the whitespace of other files…?
Which of the following can hide confidential or malicious data in the whitespace of other files (e.g.
JPEGs)?