Question: 1a. Regarding data protection and cryptography, what is not a goal or objective? A. The forensic objective involves tracking the cryptography used in the enterprise
1a. Regarding data protection and cryptography, what is not a goal or objective?
| A. | The forensic objective involves tracking the cryptography used in the enterprise and logging what algorithm and keys are used where to support later investigations.
| |
| B. | The detective objective involves monitoring the enterprise cryptographic use to detect week cryptography or cryptographic breaches when they occur. | |
| C. | The preventative objective involves protecting the confidentiality and integrity of enterprise data by using cryptographic technologies | |
| D. | The audit objective involve centrally collecting forensic data that can be analyzed by auditors and investigators |
1b.
What is not a threat factor for systems administration?
| A. | Keyboard video and mouse compromise | |
| B. | Credentials compromise | |
| C. | Theft of equipment | |
| D. | Local computer administrative account compromise |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
