1.
ActualcertsYou need to ensure that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future?
2.
The Security Development Lifecycle (SDL) consists of various security practices that are grouped under seven phases. Which of the following security practices are included in the Requirements phase? Each correct answer represents a complete solution. Choose all that apply.
3.
You work as a Network Administrator for uCertify Inc. You want to allow some users to access a particular program on the computers in the network. What will you do to accomplish this task?
4.
Which of the following is the most secure authentication scheme and uses a public key cryptography and digital certificate to authenticate a user?
5.
Which of the following is an XML-based framework developed by OASIS and used to exchange user, resource and service provisioning information between cooperating organizations?
6.
Which technology can be used to help ensure the efficient transport of VoIP traffic?
7.
In which of the following attacks does an attacker intercept call-signaling SIP message traffic and masquerade as the calling party to the called party and vice-versa?
8.
Which of the following is frequently used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it?
9.
Which of the following arise every time an application takes a user-supplied data and sends it to a Web browser without first confirming or encoding the content?
10.
Which of the following components are contained in Xsan? Each correct answer represents a complete solution. Choose all that apply.