Which of the following encrypts data a single bit at a time?
Which of the following encrypts data a single bit at a time?
Which of the following is the only encryption used?
A system administrator wants to enable WPA2 CCMP. Which of the following is the only
encryption used?
Which of the following is used to verify data integrity?
Which of the following is used to verify data integrity?
which of the following?
Two programmers write a new secure application for the human resources department to store
personal identifiable information. The programmers make the application available to themselves
using an uncommon port along with an ID and password only they know. This is an example of
which of the following?
Which of the following concepts would enforce this process?
Everyone in the accounting department has the ability to print and sign checks. Internal audit has
asked that only one group of employees may print checks while only two other employees may
sign the checks. Which of the following concepts would enforce this process?
which of the following authentication types?
The security department has implemented a new laptop encryption product in the environment.
The product requires one user name and password at the time of boot up and also another
password after the operating system has finished loading. This setup is using which of the
following authentication types?
Which of the following is the quickest way to prevent the staff group from gaining access to the payroll folde
The Human Resources department has a parent shared folder setup on the server. There are two
groups that have access, one called managers and one called staff. There are many sub folders
under the parent shared folder, one is called payroll. The parent folder access control list
propagates all subfolders and all subfolders inherit the parent permission. Which of the following is
the quickest way to prevent the staff group from gaining access to the payroll folder?
Which of the following can the finance department check to see if any of the bank’s certificates are still v
The finance department works with a bank which has recently had a number of cyber attacks. The
finance department is concerned that the banking website certificates have been compromised.
Which of the following can the finance department check to see if any of the bank’s certificates are
still valid?
Which of the following are examples of network segmentation?
Which of the following are examples of network segmentation? (Select TWO).
Which of the following provides the strongest authentication security on a wireless network?
Which of the following provides the strongest authentication security on a wireless network?