Exhibit.
How many keys would be required to support 50 users in an asymmetric cryptography system?
Correct Answer:
A
Which type of control is used to restore systems or processes to their normal state after an attack has occurred
Correct Answer:
D
Which maintains that a user or entity should only have access to the spec data, resources and applications needed to complete a required task.
Correct Answer:
C
Common network device used to connect networks?
Correct Answer:
C
A company needs to protect its confidential data from unauthorized access which logical control is best suited for this scenario
Correct Answer:
A