Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?

Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?A . Diffie-Hellman Key AgreementB . Digital Signature StandardC . Secret Key CryptographyD . Elliptic Curve CryptographyView AnswerAnswer: D

August 28, 2024 No Comments READ MORE +

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?A . Using open source discoveryB . Scanning the network perimeterC . Social engineeringD . Crafting counterfeit websitesView AnswerAnswer: A

August 28, 2024 No Comments READ MORE +

a. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?

A cloud service provider is used to perform analytics on an organization's sensitive dat a. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?A . The service providerB . Dependent upon the nature of breathC . Dependent upon...

August 27, 2024 No Comments READ MORE +

Which of the following is the BEST method of maintaining the confidentiality of digital information?

Which of the following is the BEST method of maintaining the confidentiality of digital information?A . Use of access controls, file permissions, and encryptionB . Use of backups and business continuity planningC . Use of logging digital signatures, and write protectionD . Use of the awareness tracing programs and related...

August 27, 2024 No Comments READ MORE +

One way to control the integrity of digital assets is through the use of:

One way to control the integrity of digital assets is through the use of:A . policies.B . frameworks.C . cachingD . hashing.View AnswerAnswer: D

August 26, 2024 No Comments READ MORE +

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?A . Allocating a significant amount of budget to security investmentsB . Adopting industry security standards and frameworksC . Establishing metrics to measure and monitor security performanceD . Conducting annual...

August 26, 2024 No Comments READ MORE +

Using digital evidence to provide validation that an attack has actually occurred is an example of;

Using digital evidence to provide validation that an attack has actually occurred is an example of;A . computer forensicB . extraction.C . identification.D . data acquisition.View AnswerAnswer: A

August 24, 2024 No Comments READ MORE +

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?A . Cybersecurity risk assessment methodologyB . Encryption algorithms used to encrypt...

August 24, 2024 No Comments READ MORE +

Which of the following is the BEST indication that an organization’s vulnerability management process is operating effectively?

Which of the following is the BEST indication that an organization’s vulnerability management process is operating effectively?A . Remediation efforts are communicated to managementB . The vulnerability program is formally approvedC . The vulnerability program is reviewed annually.D . Remediation efforts are prioritized.View AnswerAnswer: D

August 22, 2024 No Comments READ MORE +

Which of the following is MOST important to ensure the successful implementation of continuous auditing?

Which of the following is MOST important to ensure the successful implementation of continuous auditing?A . Budget for additional storage hardwareB . Budget for additional technical resourcesC . Top management supportD . Surplus processing capacityView AnswerAnswer: C

August 21, 2024 No Comments READ MORE +