Which of the following password policies is considered a best practice?
Which of the following password policies is considered a best practice?A . Requiring passwords to be changed every 5 yearsB . Allowing users to set easily guessable passwordsC . Enforcing a minimum password length and complexity requirementsD . Storing passwords in plain text formatView AnswerAnswer: C Explanation: Enforcing a minimum...
Which of the following encryption algorithms is considered strong?
Which of the following encryption algorithms is considered strong?A . RSAB . MD5C . ROT13D . DESView AnswerAnswer: A Explanation: RSA is considered a strong encryption algorithm because it uses asymmetric encryption, which means it uses different keys for encryption and decryption. RSA is widely used in secure communication protocols...
Which of the following describes the purpose of a VPN (Virtual Private Network)?
Which of the following describes the purpose of a VPN (Virtual Private Network)?A . To improve network performance and reduce latencyB . To segment a network into multiple smaller networksC . To provide secure remote access to a private network over the internetD . To control and filter network traffic...
Which encryption method uses a single key to both encrypt and decrypt data?
Which encryption method uses a single key to both encrypt and decrypt data?A . SSL/TLSB . Symmetric encryptionC . HashingD . Asymmetric encryptionView AnswerAnswer: B Explanation: Symmetric encryption uses a single key to both encrypt and decrypt data. This means that the same key is used by both the sender...
Which of the following is a unique identifier assigned to a network interface card (NIC)?
Which of the following is a unique identifier assigned to a network interface card (NIC)?A . IP addressB . Default gatewayC . MAC addressD . Subnet maskView AnswerAnswer: C Explanation: A Media Access Control (MAC) address is a unique identifier assigned to a network interface card (NIC) by the manufacturer....
Which of the following is a characteristic of an IPv6 address?
Which of the following is a characteristic of an IPv6 address?A . Uses colons as separatorsB . Can be represented by both decimal and binary notationC . Supports a maximum of 4.3 billion unique addressesD . Consists of 32 bitsView AnswerAnswer: A Explanation: An IPv6 address consists of 128 bits,...