• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Q1A software developer utilizes cryptographic functions to generate codes that verify message integrity. Due to the nature of the data that is being sent back and forth from the client application to the server, the developer would like to change the cryptographic function to one that verifies both authentication and message integrity. Which of the following algorithms should the software developer utilize?A. HMACB. SHAC. Two FishD. RIPEMD
Answer: A
Q2When designing a corporate NAC solution, which of the following is the MOST relevant integration issue?A. Infrastructure time syncB. End user mobilityC. 802.1X supplicant compatibilityD. Network LatencyE. Network Zoning
Answer: D
Q3Which of the following access methods uses radio frequency waves for authentication?A. Video surveillanceB. MantrapsC. Proximity readersD. Biometrics
Answer: C
Q4Which of the following authentication methods can use the SCTP and TLS protocols for reliable packet transmissions?A. TACACS+B. SAMLC. DiameterD. Kerberos
Answer: C
Q5Which of the following authentication protocols makes use of UDP for its services?A. RADIUSB. TACACS+C. LDAPD. XTACACS
Answer: A
Q6Which of the following is considered a risk management BEST practice of succession planning?A. Reducing risk of critical information being known to an individual person who may leave the organizationB. Implementing company-wide disaster recovery and business continuity plansC. Providing career advancement opportunities to junior staff which reduces the possibility of insider threatsD. Considering departmental risk management practices in place of company-wide practices
Answer: B
Q7Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of a shared key?A. SteganographyB. Hashing algorithmC. Asymmetric cryptographyD. Steam cipher
Answer: C
Q8Which of the following design components is used to isolate network devices such as web servers?A. VLANB. VPNC. NATD. DMZ
Answer: D
Q9Which of the following is MOST critical in protecting control systems that cannot be regularly patched?A. Asset inventoryB. Full disk encryptionC. Vulnerability scanningD. Network segmentation
Answer: D
Q10Identifying residual is MOST important to which of the following concepts?A. Risk deterrenceB. Risk acceptanceC. Risk mitigationD. Risk avoidance
Answer: C