Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.
Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.
Which of the following is another name for this symmetric key?
Users need to exchange a shared secret to begin communicating securely. Which of the following is
another name for this symmetric key?
which of the following when sending an email to a recipient for the first time?
In order to securely communicate using PGP, the sender of an email must do which of the following when
sending an email to a recipient for the first time?
Which of the following has Sara selected?
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which
will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara
selected?
which of the following?
The concept of rendering data passing between two points over an IP based network impervious to all
but the most sophisticated advanced persistent threats is BEST categorized as which of the following?
Which of the following transportation encryption protocols should be used to ensure maximum security between a
Which of the following transportation encryption protocols should be used to ensure maximum security
between a web browser and a web server?
Which of the following ports should be opened on a firewall to allow for NetBIOS communication?
Which of the following ports should be opened on a firewall to allow for NetBIOS communication? (Select
TWO).
Which of the following concepts is enforced by certifying that email communications have been sent by who the
Which of the following concepts is enforced by certifying that email communications have been sent by
who the message says it has been sent by?
All of the following are valid cryptographic hash functions EXCEPT:
All of the following are valid cryptographic hash functions EXCEPT:
Which of the following concepts is used by digital signatures to ensure integrity of the data?
Which of the following concepts is used by digital signatures to ensure integrity of the data?