Which of the following algorithms is BEST suited for this purpose?
In an effort to reduce data storage requirements, a company devices to hash every file and eliminate
duplicates. The data processing routines are time sensitive so the hashing algorithm is fast and supported
on a wide range of systems. Which of the following algorithms is BEST suited for this purpose?
Which of the following should the organization implement in order to be compliant with the new policy?
A new security policy in an organization requires that all file transfers within the organization be
completed using applications that provide secure transfer. Currently, the organization uses FTP and HTTP
to transfer files. Which of the following should the organization implement in order to be compliant with
the new policy?
Which of the following risk management strategies BEST describes management’s response?
A product manager is concerned about continuing operations at a facility located in a region undergoing
significant political unrest. After consulting with senior management, a decision is made to suspend
operations at the facility until the situation stabilizes. Which of the following risk management strategies
BEST describes management’s response?
Which of the following technical control should Joe put in place to BEST reduce these incidents?
Joe notices there are several user accounts on the local network generating spam with embedded
malicious code. Which of the following technical control should Joe put in place to BEST reduce these
incidents?
Which of the following can be implemented to enable users to share encrypted data while abiding by company pol
Two users need to securely share encrypted files via email. Company policy prohibits users from sharing
credentials or exchanging encryption keys. Which of the following can be implemented to enable users to
share encrypted data while abiding by company policies?
Which of the following capabilities would be MOST appropriate to consider implementing is response to the new
An information system owner has supplied a new requirement to the development team that calls for
increased non-repudiation within the application. After undergoing several audits, the owner determined
that current levels of non-repudiation were insufficient. Which of the following capabilities would be
MOST appropriate to consider implementing is response to the new requirement?
Which of the following controls can be implemented to mitigate this type of inside threat?
Joe a website administrator believes he owns the intellectual property for a company invention and has
been replacing image files on the company’s public facing website in the DMZ. Joe is using steganography
to hide stolen data. Which of the following controls can be implemented to mitigate this type of inside
threat?
which of the following?
The process of applying a salt and cryptographic hash to a password then repeating the process many
times is known as which of the following?
Which of the following is commonly used for federated identity management across multiple organizations?
Which of the following is commonly used for federated identity management across multiple
organizations?
Which of the following attack mechanisms can the attacker utilize to bypass the identified network security?
While performing surveillance activities, an attacker determines that an organization is using 802.1X to
secure LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the
identified network security?
