Question 1

Which of the following is a limitation of intrusion detection systems (IDS)?
  • Question 2

    In public key cryptography, digital signatures are primarily used to;
  • Question 3

    Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?
  • Question 4

    An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?
  • Question 5

    Which of the following is a feature of an intrusion detection system (IDS)?