1.
In a secure environment, which authentication mechanism performs better?
2.
Which of the following common attacks would the attacker capture the user's login information and replay it again later?
3.
After auditing file, which log will show unauthorized usage attempts?
4.
Which of the following encryption algorithms relies on the inability to factor large prime numbers?
5.
While monitoring application activity and modification, which system should be used?
6.
The difference between identification and authentication is that:
7.
The main objective of risk management in an organization is to reduce risk to a level:
8.
Following a disaster, which of the following functions should be returned FIRST from the backup facility to the primary facility?
9.
The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates. An executive uses PKI to encrypt sensitive emails sent to an assistant. In addition to encrypting the body of the email, the executive wants to encrypt the signature so that the assistant can verify that the email actually came from the executive. Which asymmetric key should be used by the executive to encrypt the signature?
10.
Which of the following is a reason to use a vulnerability scanner?