term1 Definition1term2 Definition2term3 Definition3
Please sign in to your Google account to access your documents:
An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?
A. TCP/IP
B. SSL
C. SCP
D. SSH
B. SSL (SECURE SOCKET LAYER)
A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfull the CISCO's requirements?
A. Username and Password
B. Retina Scan and Fingerprint Scan
C. USB Token and PIN
D. Proximity Badge and Token
C. USG Token and PIN(Something you have and Something You know.)
Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended?
A. Screen Lock
B. Voice Encryption
C. GPS Tracking
D. Device Encryption
A. Screen Lock; to secure the device.
Need help typing ? See our FAQ (opens in new window)
Please sign in to create this set. We'll bring you back here when you are done.
Discard Changes Sign in
Please sign in to add to folders.
Sign in
Don't have an account? Sign Up »
You have created 2 folders. Please upgrade to Cram Premium to create hundreds of folders!