Pete, a system administrator, is using a packet sniffer to troubleshoot remote authentication. Pete detects a device trying to communicate to UDP ports 1812 and
1813. Which of the following authentication methods is MOST likely being attempted?
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?
Which of the following does Jane, a software developer, need to do after compiling the source code of a program to attest the authorship of the binary?
During the analysis of malicious code, Matt, a security analyst, discovers JavaScript being used to send random data to another service on the same system. This
is MOST likely an example of which of the following?
A company's backup solution performs full backups weekly and is running into capacity issues. Without changing the frequency of backups, which of the following
solutions would reduce the storage requirement?