Which of the following is true about asymmetric encryption?
Which of the following is true about asymmetric encryption?
Which of the following types of cryptography is being u…
A company uses PGP to ensure that sensitive email is protected. Which of the following types of cryptography is being used here for the key exchange?
Which of the following protocols uses an asymmetric key…
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?
Which of the following techniques enables a highly secu…
Which of the following techniques enables a highly secured organization to assess security weaknesses in real time?
what mode?
In order for network monitoring to work properly, you need a PC and a network card running in what mode?
Which of the following should be performed to help avoi…
A recent audit of a company’s identity management system shows that 30% of active accounts belong to people no longer with the firm. Which of the following
should be performed to help avoid this scenario? (Select TWO).
which of the following procedures?
Privilege creep among long-term employees can be mitigated by which of the following procedures?
Which of the following account management techniques sh…
A security analyst implemented group-based privileges within the company active directory. Which of the following account management techniques should be
undertaken regularly to ensure least privilege principles?
which of the following ways should the account be handled?
A supervisor in the human resources department has been given additional job duties in the accounting department. Part of their new duties will be to check the
daily balance sheet calculations on spreadsheets that are restricted to the accounting group. In which of the following ways should the account be handled?
Which of the following practices reduces the management…
Which of the following practices reduces the management burden of access management?