Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?
Answer : B
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
Answer : D
Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.
Answer : B, C
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.
Answer : C, D
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
Answer : B, D
Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?
Answer : C
Which of the following processes identifies the threats that can impact the business continuity of operations?
Answer : C