Topic 2: Volume B
Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.
A. Authenticity
B. Globalization
C. Mobility
D. Integrity
E. Confidentiality
F. Nonrepudiation
Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?
A. PS/2
B. Joystick
C. Microphone
D. AGP
Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
A. Risk analysis
B. OODA loop
C. Cryptography
D. Firewall security
You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.
A. Reduce power consumption
B. Ease of maintenance
C. Failover
D. Load balancing
Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?
A. Kerberos
B. Cryptography
C. Cryptographer
D. Cryptanalysis
Page 10 out of 48 Pages |
Previous |