You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via
e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a
network. Which form of encryption should you use?
D
Which of the following is the most likely first step to enable a server to recover from a denial-of-
service attack in which all hard disk data is lost?
B
You purchased a network scanner six months ago. In spite of regularly conducting scans using this
software, you have noticed that attackers have been able to compromise your servers over the last
month. Which of the following is the most likely explanation for this problem?
D
What is the primary use of hash (one-way) encryption in networking?
A
Which of the following will best help you ensure a database server can withstand a recently
discovered vulnerability?
D
You have determined that the company Web server has several vulnerabilities, including a buffer
overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an
Oracle database server. It also uses many CGI scripts. Which of the following is the most effective
way to respond to this attack?
A
Which of the following standards is used for digital certificates?
C
At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?
B
A security breach has occurred in which a third party was able to obtain and misuse legitimate
authentication information. After investigation, you determined that the specific cause for the
breach was that end users have been placing their passwords underneath their keyboards. Which
step will best help you resolve this problem?
C
You have implemented a version of the Kerberos protocol for your network. What service does
Kerberos primarily offer?
A