xxxiv Assessment Test
- Which algorithm is an asymmetric encryption protocol?
A. RSA
B. AES
C. DES
D. 3DES - Which of the following is an example of a hashing algorithm?
A. ECC
B. PKI
C. SHA
D. MD - Which of the following creates a fixed-length output from a variable-length input?
A. MD5
B. MD7
C. SHA12
D. SHA8 - Granting access to a system based on a factor such as an individual’s retina during a scan is
an example of what type of authentication method?
A. Smart card
B. I&A
C. Biometrics
D. CHAP - What item is also referred to as a physical address to a computer system?
A. M AC
B. DAC
C. RBAC
D. STAC - What is the process of investigating a computer system for information relating to a security
incident?
A. Computer forensics
B. Virus scanning
C. Security policy
D. Evidence gathering
flast.indd 34 22-07-2014 11:36:27