1.
While surfing the Internet a user encounters a pop-up window that prompts the user to download a browser plug-in. The pop-up window is a certificate which validates the identity of the plug-in developer. Which of the following BEST describes this type of certificate?
2.
Which one of the following options is a vulnerability assessment tool?
3.
Which key can be used by a user to log into their network with a smart card?
4.
Which of the following describes a type of algorithm that cannot be reversed in order to decode the data?
5.
Which description is correct about authentication headers (AH)?
6.
The MOST common Certificate Server port required for secure web page access is port:
7.
Many unauthorized staff have been entering the data center by piggybacking authorized staff. The CIO has mandated to stop this behavior. Which technology should be installed at the data center to prevent piggybacking?
8.
Secret Key encryption is also known as:
9.
A digital signature or digital signature scheme is a type of asymmetric cryptography. For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?
10.
Which access control system allows the owner of a resource to establish access permissions to that resource?