Which of the following types of ciphers operates on a group of bits rather than an individual character or bit
Which of the following types of ciphers operates on a group of bits rather than an individual
character or bit of a message?
Which of the following techniques can be used by an administrator while working with the symmetric encryption
Which of the following techniques can be used by an administrator while working with the
symmetric encryption cryptography?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are types of access control attacks?
Which of the following are types of access control attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
Which of the following is a form of gate that allows one person to pass at a time?
Which of the following is a form of gate that allows one person to pass at a time?
Which of the following algorithms can be used to check the integrity of a file?
Which of the following algorithms can be used to check the integrity of a file?
Each correct answer represents a complete solution. Choose two.
What will you do to accomplish this?
You work as a Network Administrator for NetTech Inc. The company’s network is connected to the
Internet. For security, you want to restrict unauthorized access to the network with minimum
administrative effort. You want to implement a hardware-based solution. What will you do
to accomplish this?
Which of the following activities integrates SOA software assets and establishes SOA logical environment depen
The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities
that drive a service evolution during design-time and run-time. Which of the following activities
integrates SOA software assets and establishes SOA logical environment dependencies?
What is the simplest way to accomplish this?
You are responsible for security at a building that has a lot of traffic. There are even a significant
number of non-employees coming in and out of the building. You are concerned about being able to
find out who is in the building at a particular time. What is the simplest way to accomplish this?
Which of the following security architectures defines how to integrate widely disparate applications for a wor
Which of the following security architectures defines how to integrate widely disparate applications
for a world that is Web-based and uses
multiple implementation platforms?