which cannot be reversed and converts data into a string of characters?
Which of the following functions provides an output which cannot be reversed and converts data
into a string of characters?
This technique is known as:
A software developer wants to prevent stored passwords from being easily decrypted. When the
password is stored by the application, additional text is added to each password before the
password is hashed. This technique is known as:
Which of the following concepts describes the use of a one way transformation in order to validate the integri
Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
Which of the following concepts describes the use of a one way transformation in order to validate the integri
Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
Which of the following should the security administrator use to identify similar malware?
The security administrator is implementing a malware storage system to archive all malware seen
by the company into a central database. The malware must be categorized and stored based on
similarities in the code. Which of the following should the security administrator use to identify
similar malware?
which of the following steps is MOST important?
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-topeer network that cannot connect to the Internet. The ISSO can update the antivirus definitions
manually, but which of the following steps is MOST important?
which of the following steps is MOST important?
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-topeer network that cannot connect to the Internet. The ISSO can update the antivirus definitions
manually, but which of the following steps is MOST important?
Which of the following would a security administrator use to verify the integrity of a file?
Which of the following would a security administrator use to verify the integrity of a file?
Which of the following security concepts is Sara using?
Sara, a security administrator, manually hashes all network device configuration files daily and
compares them to the previous days’ hashes. Which of the following security concepts is Sara
using?
Which of the following security concepts is Sara using?
Sara, a security administrator, manually hashes all network device configuration files daily and
compares them to the previous days’ hashes. Which of the following security concepts is Sara
using?