Which of the following BEST describes the service that should be implemented to meet these requirements?
A network administrator is looking for a way to automatically update company browsers so they import a
list of root certificates from an online source. This online source will then be responsible for tracking
which certificates are to be trusted or not trusted. Which of the following BEST describes the service that
should be implemented to meet these requirements?
which of the following?
In order to use a two-way trust model the security administrator MUST implement which of the
following?
Which of the following types of trust models is used by a PKI?
Which of the following types of trust models is used by a PKI?
which of the following?
RC4 is a strong encryption protocol that is generally used with which of the following?
Which of the following MUST be implemented?
A security administrator must implement a secure key exchange protocol that will allow company clients
to autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the
following MUST be implemented?
Which of the following can the administrator do to decrypt the file?
A security administrator at a company which implements key escrow and symmetric encryption only,
needs to decrypt an employee’s file. The employee refuses to provide the decryption key to the file.
Which of the following can the administrator do to decrypt the file?
Which of the following methods would achieve this goal?
A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication
and the files the user is sending using only a user ID and a key pair. Which of the following methods
would achieve this goal?
which of the following?
Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program that
encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same program to
create a hidden volume within the encrypted hard drive and stores the sensitive information within the
hidden volume. This is an example of which of the following? (Select TWO).
Which of the following technologies provides the FASTEST revocation capability?
A company is concerned that a compromised certificate may result in a man-in-the-middle attack against
backend financial servers. In order to minimize the amount of time a compromised certificate would be
accepted by other servers, the company decides to add another validation step to SSL/TLS connections.
Which of the following technologies provides the FASTEST revocation capability?
Which of the following can the technician use to verify if a system file was compromised?
A technician wants to verify the authenticity of the system files of a potentially compromised system.
Which of the following can the technician use to verify if a system file was compromised? (Select TWO).