Tag: security

Questions Related to security

  1. Revoking credentials

  2. Encryption

  3. Communications

  4. Placement


Correct Option: A
  1. Consistent time-out enforcement across platforms

  2. A compromised password exposes all authorized resources

  3. Use of multiple passwords to remember

  4. Password change control


Correct Option: B
  1. Denial of services

  2. Fires, floods, and hurricanes

  3. Unreadable backup tapes

  4. Unauthorized transactions


Correct Option: D
  1. Encryption of data

  2. Access controls

  3. Nonrepudiation

  4. Steganography


Correct Option: D
  1. Protection of the private key

  2. Distribution of the shared key

  3. Integrity of the message

  4. History of session keys


Correct Option: A
  1. Encrypting the message with the receiver's public key

  2. Encrypting a hash of the message

  3. Having the message authenticated by a certificate authority

  4. Using a password-protected file format


Correct Option: A
  1. Send a digital signature of the message to the recipient

  2. Encrypt the message with a symmetric algorithm and send it

  3. Encrypt the message with a private key so the recipient can decrypt with the corresponding public key

  4. Send an encrypted hash of the message along with the message to the recipient


Correct Option: D
  1. Substitution and transposition

  2. Block and stream

  3. Symmetric and asymmetric

  4. DES and AES


Correct Option: B