1.
In which of the following SDLC phases are the software and other components of the system faithfully incorporated into the design specifications?
2.
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
3.
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
4.
Which of the following schemes is used by the Kerberos authentication?
5.
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?
6.
Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
7.
You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following categories of implementation of the access control includes all these security services?
8.
Which of the following protocols work at the Network layer of the OSI model?
9.
In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?
10.
Which of the following heights of fence deters only casual trespassers?