A general approach to handling encryption keys using trusted entities and

A general approach to handling encryption keys using

This preview shows page 7 - 11 out of 19 pages.

Question 271.A general approach to handling encryption keys using trusted entities and digital certificates is referred to as: Layer 2 Tunneling Protocol (L2TP).Encrypting File System (EFS).Wired Equivalent Privacy (WEP).public key infrastructure (PKI). 10 points Question 281.A symmetric key is a key that can be used to decrypt BitLocker-protected data if the primary key is lost or damaged.
Image of page 7
10 points Question 291.Data that is currently being transported from one location to another, as in a transfer across a network connection, is referred to as: 10 points Question 301.Transport Layer Security (TLS) is cryptographic protocol that operates at the transport network layer and provides security for communications across the Internet. 10 points Question 311.What name is given to a Windows feature that encrypts removable media devices? Secure Hash Algorithm (SHA)BitLocker To GoElliptic Curve Cryptography (ECC)Encrypting File System (EFS) 10 points Question 321.Which of the following refers to an encryption algorithm that uses a single key for both encryption and decryption?
Image of page 8
10 points Question 331.Wi-Fi Protected Access (WPA) is an algorithm designed to replace WiredEquivalent Privacy (WEP) by providing secure wireless communications. 10 points Question 341.A virus is a software program that attaches to or “infects” a host program. 10 points Question 351.A zero-day attack is active malware that either exploits an unknown vulnerability or one for which no fix has yet been released. TrueFalse 10 points Question 361.Ransomware covertly collects information and sends it to a collector. 10 points
Image of page 9
Question 371.Software that covertly monitors and records pieces of information such as Web surfing activities is referred to as: 10 points Question 381.Which of the following is a software program that attaches itself to, or copies itself into, another program for the purpose of causing the computer to follow instructions that were not intended by the original program developer? 10 points Question 391.Which of the following is a type of malware that modifies or replaces one or more existing programs to hide the fact a computer has been compromised? Anti-Spyware SoftwareSpywareRootkitMalware 10 points
Image of page 10
Image of page 11

You've reached the end of your free preview.

Want to read all 19 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture