Question 271.A general approach to handling encryption keys using trusted entities and digital certificates is referred to as:
Layer 2 Tunneling Protocol (L2TP).Encrypting File System (EFS).Wired Equivalent Privacy (WEP).public key infrastructure (PKI).
10 points
Question 281.A symmetric key is a key that can be used to decrypt BitLocker-protected data if the primary key is lost or damaged.

10 points
Question 291.Data that is currently being transported from one location to another, as in a transfer across a network connection, is referred to as:
10 points
Question 301.Transport Layer Security (TLS) is cryptographic protocol that operates at the transport network layer and provides security for communications across the Internet.
10 points
Question 311.What name is given to a Windows feature that encrypts removable media devices?
Secure Hash Algorithm (SHA)BitLocker To GoElliptic Curve Cryptography (ECC)Encrypting File System (EFS)
10 points
Question 321.Which of the following refers to an encryption algorithm that uses a single key for both encryption and decryption?

10 points
Question 331.Wi-Fi Protected Access (WPA) is an algorithm designed to replace WiredEquivalent Privacy (WEP) by providing secure wireless communications.
10 points
Question 341.A virus is a software program that attaches to or “infects” a host program.
10 points
Question 351.A zero-day attack is active malware that either exploits an unknown vulnerability or one for which no fix has yet been released.
TrueFalse
10 points
Question 361.Ransomware covertly collects information and sends it to a collector.
10 points

Question 371.Software that covertly monitors and records pieces of information such as Web surfing activities is referred to as:
10 points
Question 381.Which of the following is a software program that attaches itself to, or copies itself into, another program for the purpose of causing the computer to follow instructions that were not intended by the original program developer?
10 points
Question 391.Which of the following is a type of malware that modifies or replaces one or more existing programs to hide the fact a computer has been compromised?
Anti-Spyware SoftwareSpywareRootkitMalware
10 points


You've reached the end of your free preview.
Want to read all 19 pages?
- Fall '15
- f
- Cryptography, Computer network