1/ Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
A denial of service (DoS) attack
A phishing attack
An IP spoofing attack
A mapping attack
2/ Which factor contributes most to the strength of an encryption system?
The secrecy of the encryption algorithm used
The number of private keys used by the system
The length of the encryption key used
How many people have access to your public key
3/ Which three (3) are considered best practices, baselines or frameworks? (Select 3)
GDPR
ITIL
HIPAA
ISO27000 series
COBIT
Answers
Answered by
8
A denial of service (DoS) attack
A phishing attack
An IP spoofing attack
A mapping attack
2/ Which factor contributes most to the strength of an encryption system?
The secrecy of the encryption algorithm used
The number of private keys used by the system
The length of the encryption key used
How many people have access to your public key
3/ Which three (3) are considered best practices, baselines or frameworks? (Select 3)
GDPR
ITIL
HIPAA
ISO27000 series
COBIT
Similar questions