which of the following phases of the SDLC does the software and other components…?
In
which of the following phases of the SDLC does the software and other components of the system
faithfully incorporate the design specifications and provide proper documentation and training?
Which of the following are good security measures to implement?
You
have just set up a wireless network for customers at a coffee shop. Which of the following are good
security measures to implement? Each correct answer represents a complete solution. Choose two.
Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?
Which
of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?
Which of the following protocols provides the highest level of VPN security with a VPN connection that uses th
Which
of the following protocols provides the highest level of VPN security with a VPN connection that uses
the L2TP protocol?
Which of the following encryption methods comes under symmetric encryption algorithm?
Which
of the following encryption methods comes under symmetric encryption algorithm? Each correct
answer represents a complete solution. Choose three.
Which of the following uses public key cryptography to encrypt the contents of files?
Which
of the following uses public key cryptography to encrypt the contents of files?
which of the following categories can you deploy the access control?
An
access control secures the confidentiality, integrity, and availability of the information and data of an
organization. In which of the following categories can you deploy the access control? Each correct
answer represents a part of the solution. Choose all that apply.
Which of the following would protect against this?
You
are the Network Administrator for a bank. In addition to the usual security issues, you are concerned
that your customers could be the victim of phishing attacks that use fake bank Web sites. Which of
the following would protect against this?
What type of algorithm is this?
You
are responsible for security at a defense contracting firm. You are evaluating various possible
encryption algorithms to use. One of the
algorithms you are examining is not integer based, uses shorter keys, and is public key based. What
type of algorithm is this?
Which of the following formulas best describes the Single Loss Expectancy (SLE)?
Single
Loss Expectancy (SLE) represents an organization’s loss from a single threat. Which of the following
formulas best describes the Single Loss Expectancy (SLE)?