100% tevredenheidsgarantie Direct beschikbaar na je betaling Online lezen of als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Sans 401: Data Security Technologies EXAM 100% CORRECT!

Beoordeling
-
Verkocht
-
Pagina's
11
Cijfer
A+
Geüpload op
07-12-2024
Geschreven in
2024/2025

Rotation Subsitution - ANSWERSThe following example shows which kind of cipher operation?CAT becomes PNGPNG becomes CAT (Book 4 Page 18) Permutation XOR operation Rotation substitution One-way operation ECC - ANSWERSWhich of the following cryptographic algorithms is best suited for an application that requires high security and high speed; despite very limited space and power resources (such as with a smart card)? (Book 4 Page 74) RSA IDEA 3DES ECC Confirm the cryptographic hashes cannot be modfied - ANSWERSAfter storing the cryptographic hashes of critical files in a secure location, what is the next step in the process of file integrity checking? (Book 4 Page 202) Alert on new files within critical directories. At set intervals, rerun cryptographic hashes on the specified files. Confirm that cryptographic hashes cannot be modified. Compare new hashes against the original.

Meer zien Lees minder
Instelling
Sans 401: Data Security Technologies
Vak
Sans 401: Data Security Technologies

Voorbeeld van de inhoud

Sans 401: Data Security
Technologies EXAM 100%
CORRECT!
Rotation Subsitution - ANSWERSThe following example shows which kind of cipher
operation?CAT becomes PNGPNG becomes CAT (Book 4 Page 18)

Permutation
XOR operation
Rotation substitution
One-way operation

ECC - ANSWERSWhich of the following cryptographic algorithms is best suited for an
application that requires high security and high speed; despite very limited space and
power resources (such as with a smart card)? (Book 4 Page 74)

RSA
IDEA
3DES
ECC

Confirm the cryptographic hashes cannot be modfied - ANSWERSAfter storing the
cryptographic hashes of critical files in a secure location, what is the next step in the
process of file integrity checking? (Book 4 Page 202)

Alert on new files within critical directories.
At set intervals, rerun cryptographic hashes on the specified files.
Confirm that cryptographic hashes cannot be modified.
Compare new hashes against the original.

GPG - ANSWERSWhich of the following provides secure e-mail abilities such as
digitally signed email and encrypted email? (Book 4 Page 104)

EFS
Veracrypt
GPG
BitLocker

It requires monitoring and maintenance - ANSWERSWhich of the following is true of
IDS? (Book 4 Page 149)

It requires monitoring and maintenance.

, It protects from an attack.
It replaces firewalls.
It does not need trained analysts.

False Positive - ANSWERSWhat is the correct classification when an IDS triggers
malicious activity alerts that are determined to be benign/normal activity? (Book 4 Page
150)

True negative
False positive
True positive
False negative

ECC and SHA1 - ANSWERSWhich of the following ciphers would provide for
nonrepudiation of an e-mail that you compose and are about to send? (Book 4 Page 13)

Diffie-Hellman and AES-256
ECC and SHA1
3DES and RSA
Rijndael and MD5

Data Normalization - ANSWERSWhat technique is used by a network-based intrusion
detection system when it collects data and baselines it before analysis? (Book 4 Page

Frame buffering
Data normalization
Data scrubbing
Packet fragmentation

Produces a unique digital fingerprint of input data to verify integrity - ANSWERSWhich
of the following statements describes the main use of a hashing algorithm? (Book 4
Page 76)

Creates a pre-shared key to protect the data's confidentiality
Encrypts an e-mail message to ensure integrity and non-repudiation
Produces a unique digital fingerprint of input data to verify integrity
Generates keys used in perfect forward secrecy

Permutation - ANSWERSWhat is the name of a common symmetric encryption
technique that constructs a cipher using plaintext message letters but rearranges the
order in which the characters appear? (Book 4 Page 22)

Arbitrary substitution
Permutation
XOR
Rotation substitution

Geschreven voor

Instelling
Sans 401: Data Security Technologies
Vak
Sans 401: Data Security Technologies

Documentinformatie

Geüpload op
7 december 2024
Aantal pagina's
11
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€14,69
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Online lezen of als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
papersmaster01 Howard Community College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
295
Lid sinds
2 jaar
Aantal volgers
106
Documenten
14272
Laatst verkocht
4 dagen geleden
PAPERSMASTER01

On this page you will find documents , package deals, flashcards offered by seller PAPERSMASTER01.With our documents on your side you"ll be well equipped to tackle you exams and achieve the grades you need.

3,9

72 beoordelingen

5
22
4
34
3
9
2
3
1
4

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen