Tag: architecture

Questions Related to architecture

  1. Message flow

  2. Message Set

  3. Broker

  4. Broker Domain


Correct Option: A
  1. Message flow

  2. Message Set

  3. Broker

  4. Broker Domain


Correct Option: B
  1. Access,Authorization,Accounting

  2. Access,Audit,Accounting

  3. Authentication,Audit,Accounting

  4. Authentication,Authorization,Accounting


Correct Option: D
  1. Identify a User for a resource access

  2. Authorization of User for a resource access

  3. Create Identity and Provision a user for resource access

  4. Auditing user access request for a resource


Correct Option: C

What is phishing?

  1. Accessing protected resource by the user

  2. Deligating user access rights

  3. Accquiring stray network packets

  4. Acquiring sensitive information possing as trustworthy entity


Correct Option: D

What is DoS attack ?

  1. Disk Operating System

  2. Denial Of Service

  3. Domain Of Service

  4. Department Of State


Correct Option: B
  1. JavaScript

  2. Multiplatform Compatible Script

  3. Web Application security vulnerability to inject client side scripting into web pages viewed in other user sessions

  4. Extended Secure Scripting


Correct Option: C
  1. Lightweight Directory Access Protocol

  2. Least used Domain Access Protocol

  3. Lightweight Directory Authorization Protocol

  4. Lightweight Directory Accounting Protocol


Correct Option: A
  1. Public Key Cryptography (PKC) uses two keys, a "public key" and a "private key", to implement an encryption algorithm that doesn't require two parties to first exchange a secret key in order to conduct secure communications

  2. Cryptography method which uses Public key for encryption and de-cryption of the message

  3. Choice 2 is correct

  4. Choice 1 and 2 is correct


Correct Option: A
  1. Sitescope & keynote

  2. Gomez and Keynote

  3. Sitescope and nmon

  4. none of the above


Correct Option: C