Tag: security

Questions Related to security

  1. Business goals, Objectives, Organization structure and functions

  2. Business goals, Objectives, Architecture principles

  3. Business goals, Objectives, Strategic drivers

  4. None of the above


Correct Option: A
  1. Architecture Board

  2. CTO

  3. Business

  4. IT Application team


Correct Option: C
  1. Principles, models, standards, and current inventory

  2. Models, servers, software products and class diagrams

  3. Standards, Tools, application details and servers

  4. None of the above


Correct Option: A
  1. Business Problem

  2. Business function

  3. Business architecture

  4. Business need or problem


Correct Option: D
  1. Management utility

  2. Information provider application

  3. Information consumer application

  4. Development tool

  5. a and d


Correct Option: E
  1. Use Case Models

  2. Business Process Models

  3. Gap Analysis

  4. Class Models

  5. Node Connectivity Diagrams


Correct Option: C
  1. Architecture framework

  2. Enterprise Continuum

  3. Business Principles, Business Goals, and Business Drivers

  4. Architecture principles


Correct Option: C
  1. Requirements

  2. Defect density

  3. Failure Modes

  4. Availability

  5. Specifications


Correct Option: D
  1. reliability

  2. availability

  3. scope

  4. serviceability

  5. security


Correct Option: C
  1. DES

  2. RC4

  3. Block ciphers using Electronic Code Book (ECB) mode

  4. AES


Correct Option: D
Explanation:

To determine which Algorithm/Encryption method is safest for use, we need to evaluate each option and determine its level of security.

A. DES (Data Encryption Standard) is an encryption method that uses a symmetric key algorithm. It was widely used in the 1970s and 1980s but has since been replaced by more secure encryption methods. DES is vulnerable to brute-force attacks, which can decrypt the encrypted message by trying all possible keys.

B. RC4 (Rivest Cipher 4) is a symmetric key stream cipher that was widely used in the past but is now considered insecure. It has been found to have many vulnerabilities, including biases in the key-scheduling algorithm and statistical weaknesses in the keystream.

C. Block ciphers using Electronic Code Book (ECB) mode is a method of encrypting data in blocks using a symmetric key algorithm. However, it is not considered secure because it is vulnerable to certain attacks, such as pattern attacks, where the same plaintext block is encrypted to the same ciphertext block.

D. AES (Advanced Encryption Standard) is a symmetric key algorithm that is widely used and considered to be secure. It has a key size of 128, 192, or 256 bits and uses a block cipher to encrypt data. AES has been extensively tested and is currently used by many organizations, including the US government, for encryption.

Therefore, the safest Algorithm/Encryption method for use is:

The Answer is: D. AES