Which of the following should you use?
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically
used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the
following should you use?
Which of the following are the countermeasures against a man-in-the-middle attack?
Which of the following are the countermeasures against a man-in-the-middle attack? Each correct
answer represents a complete solution. Choose all that apply.
Which of the following is an electrical event shows that there is enough power on the grid to prevent from a t
Which of the following is an electrical event shows that there is enough power on the grid to
prevent from a total power loss but there is no enough power to meet the current electrical
demand?
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WA
Which of the following protocols is designed to efficiently handle high-speed data over wide area
networks (WANs)?
Which of the following statements best describes a certification authority?
Which of the following statements best describes a certification authority?
which of the following alternative processing sites is the backup facility maintained in a constant order̷
In which of the following alternative processing sites is the backup facility maintained in a constant
order, with a full complement of servers, workstations, and communication links ready to assume
the primary operations responsibility?
Which of the following should the administrator ensure during the test of a disaster recovery plan?
Which of the following should the administrator ensure during the test of a disaster recovery plan?
Which of the following principles does the SOMF concentrate on?
The service-oriented modeling framework (SOMF) provides a common modeling notation to
address alignment between business and IT organizations. Which of the following principles does
the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that
apply.
Which of the following networking devices will you use to accomplish the task?
You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the
following networking devices will you use to accomplish the task?
What authentication methods can you use for this implementation?
In your office, you are building a new wireless network that contains Windows 2003 servers. To
establish a network for secure communication, you have to implement IPSec security policy on the
servers. What authentication methods can you use for this implementation? Each correct answer
represents a complete solution. Choose all that apply.