1.
Which of the following will allow a security administrator to determine potentially malicious traffic traversing the network?
2.
Which of the following is MOST closely associated with email?
3.
Which of the following is performed when conducting a penetration test?
4.
On which of the following algorithms is PGP based?
5.
The success of a user security education and awareness plan is largely dependent on support from:
6.
Which of the following allows two people to communicate securely without having to know each other prior to communicating?
7.
When investigating data breaches caused by possible malicious action, it is important for members of the CIRT to document the location of data at all times. Which of the following BEST describes what the CIRT is trying to document?
8.
Which of the following is a transmission encryption that is generally regarded as weak?
9.
The MOST expensive and effective alternate site that provides the HIGHEST level of availability, is called a:
10.
Which of the following is an example of a single sign-on?