Which encryption algorithm has the highest bit strength?
Which encryption algorithm has the highest bit strength? A. AES B. Blowfish C. DES D. CAST E. Triple DES
Which encryption algorithm has the highest bit strength? A. AES B. Blowfish C. DES D. CAST E. Triple DES
_________________ is a type of cryptography, where letters of an original message are systematically rearranged into another sequence. A. Symmetric-key exchange B. Steganography C. Transposition cipher D. Asymmetric-key encryption E. Simple substitution cipher
Which of the following equations results in the Single Loss Expectancy for an asset? A. Asset Value x % Of Loss From Realized Exposure B. Asset Value x % Of Loss From Realized Threat C. Annualized Rate of Occurrence /…
You are a system administrator for a pool of Web servers. The vendor who sells your Web server posts a patch and sample exploit for a newly discovered vulnerability. You will take all of the actions listed below. Which of…
_______ is a method of tricking users into revealing passwords, or other sensitive information. A. Dumpster diving B. Means testing C. Social engineering D. Risk E. Exposure
Maintenance of the Business Continuity Plan (BCP) must be integrated with an organization’s _______________ process. A. Change-control B. Disaster-recovery C. Inventory-maintenance D. Discretionary-budget E. Compensation-review
Which types of security solutions should a home user deploy? (Choose TWO.) A. Managed Security Gateway B. Access control lists on a router C. Personal firewall D. Network intrusion-detection system E. Anti-virus software
Which of the following best describes an external intrusion attempt on a local-area network (LAN)? A. Internal users try to gain unauthorized access to information assets outside the organizational perimeter. B. External-intrusion attempts from sources outside the LAN are not…
A(n) _______ is the first step for determining which technical information assets should be protected. A. Network diagram B. Business Impact Analysis C. Office floor plan D. Firewall E. Intrusion detection system
Which of the following is an example of a simple, physical-access control? A. Lock B. Access control list C. Background check D. Token E. Firewall