You are using a PKI solution that is based on Secure Sockets Layer (SSL). Which of the following describes the function of the asymmetric-key-encryption algorithm used?
Answer : A
You have implemented a version of the Kerberos protocol for your network. What service does Kerberos primarily offer?
Answer : A
Which of the following is a typical target of a trojan on a Linux system?
Answer : A
Which of the following is considered to be the most secure default firewall policy, yet usually causes the most work from an administrative perspective?
Answer : B
You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. Which of the following will accomplish this goal?
Answer : C
You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?
Answer : C
Which algorithm can use a 128-bit key, and has been adopted as a standard by various governments and corporations?
Answer : C