1.
Which of the following data encryption types will BEST protect data in motion and at rest to a cloud provider?
2.
Which of the following will mitigate the effects of devices in close proximity?
3.
A major CA has been compromised and a new patch has been released to make necessary changes on user machines. Which of the following is likely to be
updated as a part of this patch?
4.
Which of the following uses both a public and private key?
5.
Visitors entering a building are required to close the back door before the front door of the same entry room is open. Which of the following is being described?
6.
Symmetric encryption utilizes________. While asymmetric encryption utilizes__________.
7.
Sara, an IT manager, wants to change the firewall rules to allow RemoteOfficeB to connect to the corporate network using SSH. Which of the following rules would
only allow necessary access?
8.
Which of the following attacks is characterized by someone following a staff member who is entering a corporate facility?
9.
Speaking a passphrase into a voice print analyzer is an example of which of the following security concepts?
10.
Jane, a corporate user, is trying to secure her laptop from drive-by download before she leaves for a computer conference. Which of the following should be
installed to keep Jane's laptop secure from these attacks?