Which of the following are restricted to 64-bit block sizes?
Which of the following are restricted to 64-bit block sizes? (Select TWO).
which will improve in-transit protection of transactional data?
A bank has a fleet of aging payment terminals used by merchants for transactional processing. The
terminals currently support single DES but require an upgrade in order to be compliant with security
standards. Which of the following is likely to be the simplest upgrade to the aging terminals which will
improve in-transit protection of transactional data?
Which of the following would Matt use to encrypt transmissions from an internal database…?
Which of the following would Matt, a security administrator, use to encrypt transmissions from an
internal database to an internal server, keeping in mind that the encryption process must add as little
latency to the process as possible?
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authent
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and
authenticity of a message while requiring a shared secret?
Which of the following cryptographic algorithms is MOST often used with IPSec?
Which of the following cryptographic algorithms is MOST often used with IPSec?
which of the following ciphers would a user need to specify the key strength?
When creating a public / private key pair, for which of the following ciphers would a user need to specify
the key strength?
Which of the following uses both a public and private key?
Which of the following uses both a public and private key?
Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following is a wireless encryption solution that the technician should implement while ensuring t
Due to hardware limitation, a technician must implement a wireless encryption algorithm that uses the
RC4 protocol. Which of the following is a wireless encryption solution that the technician should
implement while ensuring the STRONGEST level of security?
Which of the following wireless encryption methods should be implemented?
A security administrator must implement a wireless encryption system to secure mobile devices’
communication. Some users have mobile devices which only support 56-bit encryption. Which of the
following wireless encryption methods should be implemented?