In asset management, what is used to create a list of assets owned by the organization?
A. Asset inventory
B. Asset acceptable use
C. Asset disposal
D. Asset category
Which of the following are examples of symmetric block cipher algorithms?
A. Advanced Encryption Standard (AES)
B. Triple Digital Encryption Standard (3DES)
C. DSA
D. ElGamal
Which of the following is true about Diffie-Hellman?
A. Diffie-Hellman is a key agreement protocol that enables two users or devices to authenticate each other's preshared keys without actually sending the keys over the unsecured medium.
B. Diffie-Hellman is an encapsulation protocol that enables two users or devices to send data to each other.
C. Diffie-Hellman is a part of the RSA encryption suite.
D. Diffie-Hellman has three phases, and the second and third are used to encrypt data.
Which three statements indicate why an email proxy log would be important to a security analyst? (Choose three.)
A. Modern email proxies compile and log per-sender behavior statistics.
B. Most typical email proxies log outgoing emails containing sensitive confidential content that is detected by their DLP function.
C. Most email proxies perform log filtering so that false positives are kept to a minimum.
D. Email proxies such as Cisco ESA have the capability to identify malware attachments, drop them, and log the drop action.
E. Most email proxies decrypt traffic so that it can be inspected.
F. Email proxy logs contain historical information such as sender and receiver entries that can be used to track phishing attacks.
Which two statements are true about packet captures and packet capturing utilities? (Choose two.)
A. Packet captures can record transactions between specific hosts on a network and be played back later for deep packet analysis.
B. Most packet capturing tools are cumbersome and difficult to configure.
C. Packet captures can provide information about hidden content that may be inside a packet.
D. Because packet captures are relatively useless unless entire untruncated packets are captured, maximum packet length is not a configurable option in packet capture utilities.
What three threats are email-based? (Choose three.)
A. spam
B. attachment-based attacks
C. email address spoofing
D. insufficient user authentication
Which type of encryption algorithm uses the same key to encrypt and decrypt data?
A. symmetric encryption algorithm
B. Diffie-Hellman algorithm
C. asymmetric encryption algorithm
D. dodecaphonic algorithm
Which five of the following options are components of the X.509 v3 certificate standard? (Choose five.)
A. serial number
B. user name
C. issuer
D. validity date range
E. subject
F. subject public key info
G. department name
A firewall requires deep packet inspection to evaluate which layer?
A. application
B. internet
C. link
D. transport
When a user opens a web browser to initiate an HTTP connection to the http://www.example.com web server, the first TCP packet that is sent to the web server will have which TCP flag set?
A. RST
B. URG
C. PSH
D. ACK
E. SYN