Question 1
Which of the following is a limitation of intrusion detection systems (IDS)?
Question 2
In public key cryptography, digital signatures are primarily used to;
Question 3
Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?
Question 4
An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?
Question 5
Which of the following is a feature of an intrusion detection system (IDS)?