A company is planning to encrypt the files in several sensitive directories of a file server with a symmetric key. Which of the following could be used?
A. RSA
B. TwoFish
C. Diffie-Helman
D. NTLMv2
E. RIPEMD
Answer: B. TwoFish
You might also like to view...
Which of the following should be included in the administrative policies regarding passwords?
A) Passwords should not be written down and left in an accessible place. B) Passwords should not be shared with other people for any reason. C) A password should be immediately changed if compromised. D) All of the above
Which of the following are the steps in a digital forensic analysis according to NIST Special Publication 800-87?
A) Collection, acquisition, security, reporting B) Collection, examination, analysis, reporting C) Collection, security, analysis, reporting D) Collection, analysis, reporting, testifying
Having separate novice and expert interfaces for a multimedia program is generally NOT a good idea because:
a. it tends to take up too much disk space or bandwidth. b. novice users tend to get caught in the expert mode. c. only a minority of users are expert; most users are caught in between and are frustrated. d. most authoring systems are not capable of handling parallel structures. e. it makes developing documentation awkward and unwieldy.
Critical Thinking Questions 11-1 ? Lisa and her team have finished the coding of a new application, and they are ready to begin testing. She asks Tina, a senior software tester, for help in designing the types of tests that Lisa and her team should perform. Lisa mentions that one program has been developed to interact with other programs, and she wants to begin by testing the programs individually. Tina tells her about a process in which a programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. What is the name of this process?
A. Integration testing B. System testing C. Link testing D. Stub testing