Which of the following can use RC4 for encryption?
Which of the following can use RC4 for encryption? (Select TWO).
Which of the following would provide the STRONGEST encryption?
Which of the following would provide the STRONGEST encryption?
Which of the following symmetric key algorithms are examples of block ciphers?
Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE).
Which of the following should be used when a business needs a block cipher with minimal key size for internal
Which of the following should be used when a business needs a block cipher with minimal key size for
internal encryption?
Which of the following ciphers offers strong encryption with the FASTEST speed?
Sara, a security engineer, is testing encryption ciphers for performance. Which of the following ciphers
offers strong encryption with the FASTEST speed?
Which of the following should Jane select for the tunnel encryption?
Jane, a VPN administrator, was asked to implement an encryption cipher with a MINIMUM effective
security of 128-bits. Which of the following should Jane select for the tunnel encryption?
which of the following should the end user protect from compromise?
When using PGP, which of the following should the end user protect from compromise? (Select TWO).
Which of the following implements the required secure key negotiation?
A security administrator must implement a system to allow clients to securely negotiate encryption keys
with the company’s server over a public unencrypted communication channel.Which of the following implements the required secure key negotiation? (Select TWO).
Which of the following choose to provide both CRC integrity checks and RCA encryption?
An administrator has two servers and wants them to communicate with each other using a secure
algorithm.
Which of the following choose to provide both CRC integrity checks and RCA encryption?
which of the following?
Connections using point-to-point protocol authenticate using which of the following? (Select TWO).