Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.
Which of the following processes identifies the threats that can impact the business continuity of operations?
Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?
You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?
You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?
Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?
Which of the following encryption algorithms is used by the Clipper chip, which supports the escrowed encryption standard?
Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?
Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?
Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?
PDF + Testing Engine |
---|
$57.75 |
Testing Engine |
---|
$43.75 |
PDF (Q&A) |
---|
$36.75 |
ISC Free Exams |
---|
|