When designing end-user training to teach employees about using cryptography within business tasks, which of the following is an important element to include?
A. The electricity cost of encryption
B. The means of adding additional entropy to the randomness seeds
C. Key destruction
D. The consequences of failing to encrypt
Answer: D. The consequences of failing to encrypt
You might also like to view...
Which of the following is not an option on the Timing Start pop-up menu?
A. On Click B. Autoplay C. With Previous D. After Previous
A custom file property called a ________ can be used to add keywords to files to categorize and organize them
A) snip B) shake C) tag D) file
Asymmetric encryption is also called Public Key encryption
Indicate whether the statement is true or false.
During which step of the scanning and fingerprinting process can the attacker use utilities such as Angry IP Scanner and Hping to perform a ping sweep?
a. Information gathering b. Determining the network range c. Identifying active machines d. OS fingerprinting