Which of the following security goals is met by camouflaging data inside of other files?
A security administrator discovers an image file that has several plain text documents hidden in the file.
Which of the following security goals is met by camouflaging data inside of other files?
what was discovered?
A security analyst discovered data such as images and word documents hidden within different types of
files. Which of the following cryptographic concepts describes what was discovered?
Which of the following can hide confidential or malicious data in the whitespace of other files…?
Which of the following can hide confidential or malicious data in the whitespace of other files (e.g.
JPEGs)?
Which of the following must a user implement if they want to send a secret message to a coworker by embedding
Which of the following must a user implement if they want to send a secret message to a coworker by
embedding it within an image?
which of the following?
Digital Signatures provide which of the following?
Which of the following encryption methods offers this capability?
Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level
of encryption strength with a lower key length than is typically necessary. Which of the following
encryption methods offers this capability?
Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile de
Which of the following types of cryptography should be used when minimal overhead is necessary for a
mobile device?
Which of the following should the technician do to gather information about the configuration of the wireless
A security technician is attempting to access a wireless network protected with WEP. The technician does
not know any information about the network. Which of the following should the technician do to gather
information about the configuration of the wireless network?
Which of the following actions should be taken to correct this?
The IT department has installed new wireless access points but discovers that the signal extends far into
the parking lot. Which of the following actions should be taken to correct this?
Which of the following would BEST address this?
Joe, the systems administrator, is setting up a wireless network for his team’s laptops only and needs to
prevent other employees from accessing it. Which of the following would BEST address this?