C A certification authority is an entity that issues digital certificates for

C a certification authority is an entity that issues

This preview shows page 15 - 17 out of 68 pages.

C. A certification authority is an entity that issues digital certificates for use by other parties. D. A certification authority is a type of encryption that uses a single key to encrypt and decrypt data. Correct Answer: C Section: Volume A Explanation Explanation/Reference: QUESTION 48 In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site A. B. C. D. Correct Answer: Section: Volume A Explanation Explanation/Reference: QUESTION 49 Which of the following should the administrator ensure during the test of a disaster recovery plan? A. Ensure that the plan works properly B. Ensure that all the servers in the organization are shut down. C. Ensure that each member of the disaster recovery team is aware of their responsibility. D. Ensure that all client computers in the organization are shut down. Correct Answer: CA Section: Volume A Explanation Explanation/Reference: QUESTION 50 The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply. A. Disaster recovery planning B. SOA value proposition C. Software assets reuse D. Architectural components abstraction E. Business traceability Correct Answer: EBCD Section: Volume A Explanation
Image of page 15
Explanation/Reference: QUESTION 51 You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task? A. Hub B. Switch C. Repeater D. Router Correct Answer: C Section: Volume A Explanation Explanation/Reference: QUESTION 52 In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply. A. Public-key cryptography B. Kerberos C. Preshared keys D. Digital certificates Correct Answer: BDC Section: Volume A Explanation Explanation/Reference: QUESTION 53 Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two. A. Data service B. Ticket-granting service C. Account service D. Authentication service Correct Answer: DB Section: Volume A Explanation Explanation/Reference: QUESTION 54 Kerberos is a computer network authentication protocol that allows individuals communicating over a non- secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution.
Image of page 16
Image of page 17

You've reached the end of your free preview.

Want to read all 68 pages?

  • Spring '16
  • Public-key cryptography, Network administrator, following access control models

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture