Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.
You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?
You work as a remote support technician. A user named Rick calls you for support. Rick wants to connect his LAN connection to the Internet. Which of the following devices will you suggest that he use?
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods will allow data to be sent on the Internet in a secure format?
Which of the following describes the acceptable amount of data loss measured in time?
Which of the following protocols work at the Network layer of the OSI model?
Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.
The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?
Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.