• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/3

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

3 Cards in this Set

  • Front
  • Back

An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?



A. TCP/IP


B. SSL


C. SCP


D. SSH

B. SSL (SECURE SOCKET LAYER)

A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfull the CISCO's requirements?



A. Username and Password


B. Retina Scan and Fingerprint Scan


C. USB Token and PIN


D. Proximity Badge and Token

C. USG Token and PIN
(Something you have and Something You know.)

Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended?



A. Screen Lock


B. Voice Encryption


C. GPS Tracking


D. Device Encryption

A. Screen Lock; to secure the device.