Which of the following MUST be implemented?
A security administrator must implement a secure key exchange protocol that will allow company clients
to autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the
following MUST be implemented?
Which of the following can the administrator do to decrypt the file?
A security administrator at a company which implements key escrow and symmetric encryption only,
needs to decrypt an employee’s file. The employee refuses to provide the decryption key to the file.
Which of the following can the administrator do to decrypt the file?
Which of the following methods would achieve this goal?
A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication
and the files the user is sending using only a user ID and a key pair. Which of the following methods
would achieve this goal?
which of the following?
Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program that
encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same program to
create a hidden volume within the encrypted hard drive and stores the sensitive information within the
hidden volume. This is an example of which of the following? (Select TWO).
Which of the following technologies provides the FASTEST revocation capability?
A company is concerned that a compromised certificate may result in a man-in-the-middle attack against
backend financial servers. In order to minimize the amount of time a compromised certificate would be
accepted by other servers, the company decides to add another validation step to SSL/TLS connections.
Which of the following technologies provides the FASTEST revocation capability?
Which of the following can the technician use to verify if a system file was compromised?
A technician wants to verify the authenticity of the system files of a potentially compromised system.
Which of the following can the technician use to verify if a system file was compromised? (Select TWO).
which of the following should be used for transmitting company documents?
When confidentiality is the primary concern, and a secure channel for key exchange is not available,
which of the following should be used for transmitting company documents?
Which of the following would be the BEST option?
A small company wants to employ PKI. The company wants a cost effective solution that must be simple
and trusted. They are considering two options: X.509 and PGP. Which of the following would be the BEST
option?
Which of the following represents a cryptographic solution where the encrypted stream cannot be captured by a
Which of the following represents a cryptographic solution where the encrypted stream cannot be
captured by a sniffer without the integrity of the stream being compromised?
Which of the following did the developer MOST likely implement?
A new client application developer wants to ensure that the encrypted passwords that are stored in their
database are secure from cracking attempts. To implement this, the developer implements a function on
the client application that hashes passwords thousands of times prior to being sent to the database.
Which of the following did the developer MOST likely implement?