00:00

QUESTION 21

- (Exam Topic 1)
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

Correct Answer: C

QUESTION 22

- (Exam Topic 2)
Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

Correct Answer: ACD

QUESTION 23

- (Exam Topic 2)
Which of the following are man-made threats that an organization faces? Each correct answer represents a complete solution. Choose three.

Correct Answer: ABD

QUESTION 24

- (Exam Topic 2)
You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher.
Which of the following should you choose for this client?

Correct Answer: C

QUESTION 25

- (Exam Topic 1)
Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Correct Answer: C