Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?