Which of the following could the technician use to prepare the report?
Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets
to a competitor. Joe had already been working for two hours before leaving the premises.A security technician was asked to prepare a report of files that had changed since last night’s integrity
scan.
Which of the following could the technician use to prepare the report? (Select TWO).
Which of the following would be used to validate programs prior to installing them?
Users report that after downloading several applications, their systems’ performance has noticeably
decreased. Which of the following would be used to validate programs prior to installing them?
Which of the following is used to verify data integrity?
Which of the following is used to verify data integrity?
Which of the following can be implemented with multiple bit strength?
Which of the following can be implemented with multiple bit strength?
Which of the following should be recommended?
To ensure compatibility with their flagship product, the security engineer is tasked to recommend an
encryption cipher that will be compatible with the majority of third party software and hardware vendors.
Which of the following should be recommended?
Which of the following provides additional encryption strength by repeating the encryption process with additi
Which of the following provides additional encryption strength by repeating the encryption process with
additional keys?
Which of the following are restricted to 64-bit block sizes?
Which of the following are restricted to 64-bit block sizes? (Select TWO).
which will improve in-transit protection of transactional data?
A bank has a fleet of aging payment terminals used by merchants for transactional processing. The
terminals currently support single DES but require an upgrade in order to be compliant with security
standards. Which of the following is likely to be the simplest upgrade to the aging terminals which will
improve in-transit protection of transactional data?
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authent
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and
authenticity of a message while requiring a shared secret?
Which of the following would Matt use to encrypt transmissions from an internal database…?
Which of the following would Matt, a security administrator, use to encrypt transmissions from an
internal database to an internal server, keeping in mind that the encryption process must add as little
latency to the process as possible?