Which of the following ciphers offers strong encryption with the FASTEST speed?
Sara, a security engineer, is testing encryption ciphers for performance. Which of the following
ciphers offers strong encryption with the FASTEST speed?
Which of the following should Jane select for the tunnel encryption?
Jane, a VPN administrator, was asked to implement an encryption cipher with a MINIMUM
effective security of 128-bits. Which of the following should Jane select for the tunnel encryption?
which of the following should the end user protect from compromise?
When using PGP, which of the following should the end user protect from compromise? (Select
TWO).
which of the following should the end user protect from compromise?
When using PGP, which of the following should the end user protect from compromise? (Select
TWO).
Which of the following implements the required secure key negotiation?
A security administrator must implement a system to allow clients to securely negotiate encryption
keys with the company’s server over a public unencrypted communication channel.
Which of the following implements the required secure key negotiation? (Select TWO).
which of the following?
Connections using point-to-point protocol authenticate using which of the following? (Select TWO).
which of the following?
Connections using point-to-point protocol authenticate using which of the following? (Select TWO).
Which of the following offers the LEAST secure encryption capabilities?
Which of the following offers the LEAST secure encryption capabilities?
Which of the following algorithms has well documented collisions?
Which of the following algorithms has well documented collisions? (Select TWO).
Which of the following algorithms has well documented collisions?
Which of the following algorithms has well documented collisions? (Select TWO).