which of the following should be used for transmitting company documents?
When confidentiality is the primary concern, and a secure channel for key exchange is not available,
which of the following should be used for transmitting company documents?
Which of the following would be the BEST option?
A small company wants to employ PKI. The company wants a cost effective solution that must be simple
and trusted. They are considering two options: X.509 and PGP. Which of the following would be the BEST
option?
Which of the following represents a cryptographic solution where the encrypted stream cannot be captured by a
Which of the following represents a cryptographic solution where the encrypted stream cannot be
captured by a sniffer without the integrity of the stream being compromised?
Which of the following did the developer MOST likely implement?
A new client application developer wants to ensure that the encrypted passwords that are stored in their
database are secure from cracking attempts. To implement this, the developer implements a function on
the client application that hashes passwords thousands of times prior to being sent to the database.
Which of the following did the developer MOST likely implement?
Which of the following will Joe need to use to BEST accomplish the objective?
Joe must send Ann a message and provide Ann with assurance that he was the actual sender. Which of
the following will Joe need to use to BEST accomplish the objective?
Which of the following would BEST meet this security goal?
A system administrator wants to confidentially send a user name and password list to an individual
outside the company without the information being detected by security controls. Which of the following
would BEST meet this security goal?
which of the following?
Protecting the confidentiality of a message is accomplished by encrypting the message with which of the
following?
Which of the following algorithms should the software developer utilize?
A software developer utilizes cryptographic functions to generate codes that verify message integrity.
Due to the nature if the data that is being sent back and forth from the client application to the server,
the developer would like to change the cryptographic function to one that verities both authentication
and message integrity. Which of the following algorithms should the software developer utilize?
which of the following is the MOST relevant integration issue?
When designing a corporate NAC solution, which of the following is the MOST relevant integration issue?
Which of the following access methods uses radio frequency waves for authentication?
Which of the following access methods uses radio frequency waves for authentication?