31. Which type of encryption is generally slower because the algorithms generate a pair of encryption keys?

  • Asymmetric
  • Rivest–Shamir–Adleman (RSA)
  • Data encryption standard (DES)
  • Symmetric

32. The main responsibility of a receptionist at a healthcare company is to check-in visitors upon arrival. When visitors check-in, which kinds of information should the receptionist be able to access to complete their task? Select two answers.

  • The patient being visited
  • Their billing information
  • Their medical history
  • A photo ID

33. A customer of an online retailer has complained that their account contains an unauthorized purchase. You investigate the incident by reviewing the retailer's access logs. What are some components of the user's session that you might review? Select two answers.

  • Session certificate
  • Session algorithm
  • Session cookie
  • Session ID

34. What is the purpose of security controls?

  • Create policies and procedures
  • Encrypt information for privacy
  • Establish incident response systems
  • Reduce specific security risks

35. A paid subscriber of a news website has access to exclusive content. As a data owner, what should the subscriber be authorized to do with their account? Select three answers.

  • Stop their subscription
  • Review their username and password
  • Edit articles on the website
  • Update their payment details

36. What are common authorization tools that are designed with the principle of least privilege and separation of duties in mind? Select three answers.

  • API Tokens
  • SHA256
  • Basic auth
  • OAuth

37. What is the practice of monitoring the access logs of a system?

  • Auditing
  • Authentication
  • Accounting
  • Authorization

Leave a Reply