Which of the following can the administrator do to decrypt the file?
A security administrator at a company which implements key escrow and symmetric encryption
only, needs to decrypt an employee’s file. The employee refuses to provide the decryption key to
the file. Which of the following can the administrator do to decrypt the file?
Which of the following methods would achieve this goal?
A system administrator is setting up a file transfer server. The goal is to encrypt the user
authentication and the files the user is sending using only a user ID and a key pair. Which of the
following methods would achieve this goal?
which of the following?
Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program
that encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same
program to create a hidden volume within the encrypted hard drive and stores the sensitive
information within the hidden volume. This is an example of which of the following? (Select TWO).
Which of the following technologies provides the FASTEST revocation capability?
A company is concerned that a compromised certificate may result in a man-in-the-middle attack
against backend financial servers. In order to minimize the amount of time a compromised
certificate would be accepted by other servers, the company decides to add another validation
step to SSL/TLS connections. Which of the following technologies provides the FASTEST
revocation capability?
Which of the following can the technician use to verify if a system file was compromised?
A technician wants to verify the authenticity of the system files of a potentially compromised
system. Which of the following can the technician use to verify if a system file was compromised?
(Select TWO).
which of the following should be used for transmitting company documents?
When confidentiality is the primary concern, and a secure channel for key exchange is not
available, which of the following should be used for transmitting company documents?
Which of the following would be the BEST option?
A small company wants to employ PKI. The company wants a cost effective solution that must be
simple and trusted. They are considering two options: X.509 and PGP. Which of the following
would be the BEST option?
Which of the following represents a cryptographic solution where the encrypted stream cannot be captured by a
Which of the following represents a cryptographic solution where the encrypted stream cannot be
captured by a sniffer without the integrity of the stream being compromised?
Which of the following did the developer MOST likely implement?
A new client application developer wants to ensure that the encrypted passwords that are stored in
their database are secure from cracking attempts. To implement this, the developer implements a
function on the client application that hashes passwords thousands of times prior to being sent to
the database. Which of the following did the developer MOST likely implement?
Which of the following will Joe need to use to BEST accomplish the objective?
Joe must send Ann a message and provide Ann with assurance that he was the actual sender.
Which of the following will Joe need to use to BEST accomplish the objective?