- (Exam Topic 1)
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
Correct Answer:BD
- (Exam Topic 1)
Which of the following authentication methods prevents unauthorized execution of code on remote systems?
Correct Answer:B
- (Exam Topic 2)
Which of the following authentication methods is based on physical appearance of a user?
Correct Answer:B
- (Exam Topic 2)
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.
Correct Answer:BCD
- (Exam Topic 1)
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?
Correct Answer:C