View Mode
Q: 1
What is the name of a one way transformation of a string of characters into a usually shorter fixed- length value or key that represents the original string? Such a transformation cannot be reversed?
Options
Q: 2
A multinational corporation has detected unusual activity suggesting that an attacker has gained access to the hypervisor layer of their virtual environment. What is the most critical immediate step the security team should take to mitigate the threat?
Options
Q: 3
What is the primary role of smartcards in a PKI?
Options
Q: 4
Which of the following services is NOT provided by the digital signature standard (DSS)?
Options
Q: 5
Which of the following is a method of multiplexing data where a communication channel is divided into an arbitrary number of variable bit-rate digital channels or data streams. This method allocates bandwidth dynamically to physical channels having information to transmit?
Options
Q: 6
What protocol is used on the Local Area Network (LAN) to obtain an IP address from it's known MAC address?
Options
Q: 7
You have been tasked to develop an effective information classification program. Which one of the following steps should be performed first?
Options
Q: 8
Which of the following LAN topologies offers the highest availability?
Options
Q: 9
Which of the following ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING LARGE NUMBERS?
Options
Q: 10
What is the effective key size of DES?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE