Which of the following is a symmetric encryption algorithm?
3DES
MD5
ECC
RSA
What is the FIRST step in developing the vulnerability management program?
Baseline the Environment
Maintain and Monitor
Organization Vulnerability
Define Policy