Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.
Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.
Which of the following processes could MOST effectively mitigate these risks?
A network administrator is responsible for securing applications against external attacks. Every
month, the underlying operating system is updated. There is no process in place for other software
updates. Which of the following processes could MOST effectively mitigate these risks?
Which of the following would be required to meet this demand?
The main corporate website has a service level agreement that requires availability 100% of the
time, even in the case of a disaster. Which of the following would be required to meet this
demand?
Which of the following practices are they following to ensure application integrity?
The software developer is responsible for writing the code and promoting from the development
network to the quality network. The network administrator is responsible for promoting code to the
production application servers. Which of the following practices are they following to ensure
application integrity?
Which of the following practices is being implemented?
A software developer is responsible for writing the code on an accounting application. Another
software developer is responsible for developing code on a system in human resources. Once a
year they have to switch roles for several weeks. Which of the following practices is being
implemented?
Which of the following is a vulnerability associated with disabling pop-up blockers?
Which of the following is a vulnerability associated with disabling pop-up blockers?
which of the following types of testing?
A quality assurance analyst is reviewing a new software product for security, and has complete
access to the code and data structures used by the developers. This is an example of which of the
following types of testing?
Which of the following ports should be opened?
A security technician needs to open ports on a firewall to allow for domain name resolution. Which
of the following ports should be opened? (Select TWO).
which of the following types of testing?
The security consultant is assigned to test a client’s new software for security, after logs show
targeted attacks from the Internet. To determine the weaknesses, the consultant has no access to
the application program interfaces, code, or data structures. This is an example of which of the
following types of testing?
Which statement BEST describes her privileges?
During an anonymous penetration test, Jane, a system administrator, was able to identify a shared
print spool directory, and was able to download a document from the spool. Which statement
BEST describes her privileges?