Sans 401 Data Security
Technologies
Comprehensive
Questions (Frequently
Tested) with Verified
Answers Graded A+
, Contact forr furrther consultation
1. The following example shows which kind of cipher operation?CAT
becomes PNGPNG becomes CAT (Book 4 Page 18)
Permutation
XOR
operation
Rotation substitution
One-way operation Answer: Rotation Subsitution
2. Which of the following cryptographic algorithms is best suited for an
applica- tion that requires high security and high speed; despite very
limited space and power resources (such as with a smart card)? (Book
4 Page 74)
RSA
IDEA
3DES
ECC
Answer:
, Contact forr furrther consultation
ECC
3. After storing the cryptographic hashes of critical files in a secure
location,
what is the next step in the process of file integrity checking? (Book 4
Page 202)
Alert on new files within critical directories.
At set intervals, rerun cryptographic hashes on the specified
files. Confirm that cryptographic hashes cannot be
modified.
Compare new hashes against the original. Answer: Confirm the cryptographic hashes
cannot be modfied
4. Which of the following provides secure e-mail abilities such as
digitally signed email and encrypted email? (Book 4 Page 104)
EFS
Veracry
pt GPG
BitLocker Answer: GPG