You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?
Answer : D
Which of the following authentication methods is based on physical appearance of a user?
Answer : B
Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?
Answer : C
Which of the following algorithms is found to be suitable for both digital signature and encryption?
Answer : D
Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?
Answer : C
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?
Answer : A
Fill in the blank with the appropriate encryption system. The ______ encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which is based on the Diffie- Hellman key agreement.
Answer : A