A symmetric encryption algorithm Is BEST suited for:
A symmetric encryption algorithm Is BEST suited for:A . key-exchange scalability.B . protecting large amounts of data.C . providing hashing capabilities,D . implementing non-repudiation.View AnswerAnswer: D
cause of the CRO’s concerns?
The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed....
Which of the following BEST describe this type of attack?
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all...
Which of the following services would BEST meet the criteria?
An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?A . TLSB . PFSC . ESPD . AHView AnswerAnswer: A
Which of the following targeted the organization?
An organization just experienced a major cyberattack modem. The attack was well coordinated sophisticated and highly skilled. Which of the following targeted the organization?A . Shadow ITB . An insider threatC . A hacktivistD . An advanced persistent threatView AnswerAnswer: D
Which of the following would meet the organization’s needs for a third factor?
An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?A . Date of birthB . FingerprintsC . PIND . TPMView AnswerAnswer: B
Which of the following would MOST likely contain that information?
An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button. Which of the following would MOST likely contain that information?A . NGFWB . PagefileC . NetFlowD . RAMView AnswerAnswer: C
Which of the following would be the MOST acceptable?
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A
Which of the following would BEST meet these requirements?
A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements?...
Which of the following is happening to this switch?
A security administrator checks the table of a network switch, which shows the following output: Which of the following is happening to this switch?A . MAC FloodingB . DNS poisoningC . MAC cloningD . ARP poisoningView AnswerAnswer: A