Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Q1A software developer utilizes cryptographic functions to generate codes that verify message integrity. Due to the nature of the data that is being sent back and forth from the client application to the server, the developer would like to change the cryptographic function to one that verifies both authentication and message integrity. Which of the following algorithms should the software developer utilize?A. HMACB. SHAC. Two FishD. RIPEMD
|
Answer: A
|
|
Q2When designing a corporate NAC solution, which of the following is the MOST relevant integration issue?A. Infrastructure time syncB. End user mobilityC. 802.1X supplicant compatibilityD. Network LatencyE. Network Zoning
|
Answer: D
|
|
Q3Which of the following access methods uses radio frequency waves for authentication?A. Video surveillanceB. MantrapsC. Proximity readersD. Biometrics
|
Answer: C
|
|
Q4Which of the following authentication methods can use the SCTP and TLS protocols for reliable packet transmissions?A. TACACS+B. SAMLC. DiameterD. Kerberos
|
Answer: C
|
|
Q5Which of the following authentication protocols makes use of UDP for its services?A. RADIUSB. TACACS+C. LDAPD. XTACACS
|
Answer: A
|
|
Q6Which of the following is considered a risk management BEST practice of succession planning?A. Reducing risk of critical information being known to an individual person who may leave the organizationB. Implementing company-wide disaster recovery and business continuity plansC. Providing career advancement opportunities to junior staff which reduces the possibility of insider threatsD. Considering departmental risk management practices in place of company-wide practices
|
Answer: B
|
|
Q7Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of a shared key?A. SteganographyB. Hashing algorithmC. Asymmetric cryptographyD. Steam cipher
|
Answer: C
|
|
Q8Which of the following design components is used to isolate network devices such as web servers?A. VLANB. VPNC. NATD. DMZ
|
Answer: D
|
|
Q9Which of the following is MOST critical in protecting control systems that cannot be regularly patched?A. Asset inventoryB. Full disk encryptionC. Vulnerability scanningD. Network segmentation
|
Answer: D
|
|
Q10Identifying residual is MOST important to which of the following concepts?A. Risk deterrenceB. Risk acceptanceC. Risk mitigationD. Risk avoidance
|
Answer: C
|