Tim is purchasing a smart card solution for his company. He needs to be aware ofthe various attacks that can take place against smart cards. Which of the followingis not an example of a side-channel attack?
Within a Windows environment, what is the relationship between a SAM and Syskey?
"Subjects can access resources in domains of equal or lower trust levels." This is an easy sentence, but a difficult concept for many people to really understand.Which of the following is not an example of this concept?
Security domains are critical constructs in a physical network and within alogical environment, as in an operating system. Which of the following best describes how addressing allows for isolation?
Which of the following is the best definition of a security domain?
Two types of contactless smart cards are available which are the hybrid andcombi. Which of the following best describes their differences?Page 4cess trol-P2.txt
One of the following is not an example of a domain. Choose the correct answer.
What is the reason that Kerberos and SESAME, among other products, can beaccessible through GSSAPI?
Which of the following is not a necessary characteristic of a Kerberos implementation?
Most Kerberos implementations use an authenticator. What is an authenticator andwhat is its purpose?