Which of the following hashing methods would Matt have …
Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message is 160-bits long. Which of the following hashing methods would
Matt have to use to obtain this digital fingerprint?
Which of the following security concepts is Sara using?
Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days’ hashes. Which of the following
security concepts is Sara using?
Which of the following would a security administrator u…
Which of the following would a security administrator use to verify the integrity of a file?
which of the following steps is MOST important?
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer- to-peer network that cannot connect to the Internet. The ISSO can
update the antivirus definitions manually, but which of the following steps is MOST important?
Which of the following should the security administrato…
The security administrator is implementing a malware storage system to archive all malware seen by the company into a central database. The malware must be
categorized and stored based on similarities in the code. Which of the following should the security administrator use to identify similar malware?
Which of the following concepts describes the use of a …
Which of the following concepts describes the use of a one way transformation in order to validate the integrity of a program?
This technique is known as:
A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to
each password before the password is hashed. This technique is known as:
Which of the following methods should the company consi…
Customers’ credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in
transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future?
Which of the following can a security technician implem…
After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the document is no longer encrypted. Which of the following can a
security technician implement to ensure that documents stored on Joe’s desktop remain encrypted when moved to external media or other network based storage?
Which of the following is the BEST concept to maintain …
Which of the following is the BEST concept to maintain required but non-critical server availability?