Which algorithm are they most likely using for hashing?
You are the Security Consultant and have been contacted by a client regarding their encryption
and hashing algorithms. Their in-house network administrator tells you that their current hashing
algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm
are they most likely using for hashing?
Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?
Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?
Each correct answer represents a complete solution. Choose two.
Choose all that apply
A security policy is an overall general statement produced by senior management that dictates
what role security plays within the organization. What are the different types of policies Each
correct answer represents a complete solution. Choose all that apply.
Which of the following agencies provides command and control capabilities and enterprise infrastructure…
Which of the following agencies provides command and control capabilities and enterprise
infrastructure to continuously operate and assure a global net-centric enterprise in direct support
to joint warfighters, National level leaders, and other mission and coalition partners across the full
spectrum of operations
Which of the following types of firewalls will you configure to accomplish the task?
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based
network. You need to configure a firewall for the company. The firewall should be able to keep
track of the state of network connections traveling across the network. Which of the following types
of firewalls will you configure to accomplish the task?
which of the following US laws will john be charged?
John is a black hat hacker. FBI arrested him while performing some email scams. Under which of
the following US laws will john be charged?
Which of the following acts is used to recognize the importance of information security to the economic and na
Which of the following acts is used to recognize the importance of information security to the
economic and national security interests of the United States
Which of the following is violated in a shoulder surfing attack?
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the
premises of an organization. This attack is often performed by looking surreptitiously at the
keyboard of an employee’s computer while he is typing in his password at any access point such
as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?
Which of the following statements are true about a hot site?
Which of the following statements are true about a hot site? Each correct answer represents a
complete solution. Choose all that apply.
Under which of the following CNSS policies, NIACAP is mandatory for all the systems that process USG classifie
Under which of the following CNSS policies, NIACAP is mandatory for all the systems that process
USG classified information