Which of the following cryptographic system services ensures that the information will not be disclosed to any
Which of the following cryptographic system services ensures that the information will not be
disclosed to any unauthorized person on a local network?
What is the security and cryptographic framework used in Mac OS X called?
What is the security and cryptographic framework used in Mac OS X called?
Which of the following cryptographic system services proves a user’s identity?
Which of the following cryptographic system services proves a user’s identity?
What would Kevin accomplish by typing in the following command?
Kevin wants to use an SSL certificate from his Mac OS X server so that he can send and receive
encrypted email. What would Kevin accomplish by typing in the following command?
certtool c k=/Users/root/Library/Keychains/certkc
Which of the following procedures will be involved by the preparation phase of the Incident handling process?
The Incident handling process implemented in an enterprise is responsible to deal with all the
incidents regarding the enterprise. Which of the following procedures will be involved by the
preparation phase of the Incident handling process?
What will the following command accomplish?
Fred has just finished developing a number of ASP pages that will be posted to his company’s
website. Fred does not want the page’s source code viewed by anyone, so he decided to encode
the pages to make the source code unusable. What will the following command accomplish?
screnc /e asp *.* c:\tmp
Which of the following RAID levels provides fault tolerance?
Which of the following RAID levels provides fault tolerance?
Which methodology is a method to analyze the involved tasks in completing a given project, especially the time
Which methodology is a method to analyze the involved tasks in completing a given project,
especially the time needed to complete each task, and identifying the minimum time needed to
complete the total project?
What will this line accomplish?
Jacob is the system administrator for his company, managing over 20 Linux-based servers.
Jacob wants to ensure that his servers are secure so he decides to add the following line to the
/etc/sysctl.conf file:
net.ipv4.conf.all.rp_filter = 1
What will this line accomplish?
Which of the following types of risk response are you following?
You are the project manager for a construction project. The project involves casting of a column in
a very narrow space. Because of the lack of space, casting is highly dangerous. High technical
skill will be required for casting that column. You decide to hire a local expert team for casting that
column. Which of the following types of risk response are you following?