Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?
Answer : D
Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?
Answer : C
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?
Answer : A
Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?
Answer : B
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
Answer : A
Which of the following types of ciphers are included in the historical ciphers? Each correct answer represents a complete solution. Choose two.
Answer : B, D
You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is not enough and want to have employees use tokens for authentication. Which of the following is not an example of tokens?
Answer : C