- (Exam Topic 1)
Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.
Correct Answer:ADE
- (Exam Topic 1)
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
Correct Answer:A
- (Exam Topic 2)
You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?
Correct Answer:B
- (Exam Topic 2)
Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?
Correct Answer:D
- (Exam Topic 1)
The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.
Correct Answer:BCDE