Topic 1: Volume A
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?
A. RSTP
B. SKIP
C. OCSP
D. HTTP
Which of the following cables provides maximum security against electronic eavesdropping on a network?
A. Fibre optic cable
B. STP cable
C. UTP cable
D. NTP cable
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
A. Data service
B. Ticket-granting service
C. Account service
D. Authentication service
Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?
A. SMTP service
B. Terminal service
C. Directory service
D. DFS service
A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.
A. In order to digitally sign an electronic record, a person must use his/her public key.
B. In order to verify a digital signature, the signer's private key must be used.
C. In order to digitally sign an electronic record, a person must use his/her private key.
D. In order to verify a digital signature, the signer's public key must be used.
Page 6 out of 48 Pages |
Previous |