Computer Science, asked by miyubhashi2002, 4 months ago

1/ Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?

A denial of service (DoS) attack
A phishing attack
An IP spoofing attack
A mapping attack

2/ Which factor contributes most to the strength of an encryption system?

The secrecy of the encryption algorithm used
The number of private keys used by the system
The length of the encryption key used
How many people have access to your public key

3/ Which three (3) are considered best practices, baselines or frameworks? (Select 3)

GDPR
ITIL
HIPAA
ISO27000 series
COBIT

Answers

Answered by nithya12333
8

A denial of service (DoS) attack

A phishing attack

An IP spoofing attack

A mapping attack

2/ Which factor contributes most to the strength of an encryption system?

The secrecy of the encryption algorithm used

The number of private keys used by the system

The length of the encryption key used

How many people have access to your public key

3/ Which three (3) are considered best practices, baselines or frameworks? (Select 3)

GDPR

ITIL

HIPAA

ISO27000 series

COBIT

Similar questions