Which of the following monitors program activities and modifies malicious activities on a system?
Which of the following provides a credential that can be used by all Kerberos-enabled servers and applications?
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
Which Wireless network standard operates at 2.4 GHz and transfers data at a rate of 54 Mbps?
The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?
Each correct answer represents a complete solution. Choose all that apply.
Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?
The new security policy requires you to encrypt all data transmitted from the laptop computers of sales personnel to the distribution centers. How will you implement the security requirements?
(Click the Exhibit button on the toolbar to see the case study.)
You have an antivirus program for your network. It is dependent upon using lists of known viruses. What is this type of scan called?
You work as a Software Developer for Mansoft Inc. You create an application. You want to use the application to encrypt data. You use the HashAlgorithmType enumeration to specify the algorithm used for generating Message Authentication Code (MAC) in Secure Sockets Layer (SSL) communications.
Which of the following are valid values for HashAlgorithmType enumeration?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following protocols work at the Network layer of the OSI model?