1.
ActualcertsYou need to ensure that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future?
2.
The Security Development Lifecycle (SDL) consists of various security practices that are grouped under seven phases. Which of the following security practices are included in the Requirements phase? Each correct answer represents a complete solution. Choose all that apply.
3.
You work as a Network Administrator for uCertify Inc. You want to allow some users to access a particular program on the computers in the network. What will you do to accomplish this task?
4.
Which of the following is the most secure authentication scheme and uses a public key cryptography and digital certificate to authenticate a user?
5.
Which of the following is an XML-based framework developed by OASIS and used to exchange user, resource and service provisioning information between cooperating organizations?