217 EC0 350 A PKI provides data with encryption compression and restorability B

217 ec0 350 a pki provides data with encryption

This preview shows page 5 - 8 out of 8 pages.

217
Image of page 5
EC0-350 A. PKI provides data with encryption, compression, and restorability. B. Public-key encryption was invented in 1976 by Whitfield Diffie and Martin Hellman. C. When it comes to eCommerce, as long as you have authenticity, and authenticity, you do not need encryption. D. RSA is a type of encryption. Answer: B, D Explanation: PKI provides confidentiality, integrity, and authenticity of the messages exchanged between these two types of systems. The 3rd party provides the public key and the receiver verifies the message with a combination of the private and public key. Public-key encryption WAS invented in 1976 by Whitfield Diffie and Martin Hellman. The famous hashing algorithm Diffie- Hellman was named after them. The RSA Algorithm is created by the RSA Security company that also has created other widely used encryption algorithms. QUESTION: 476 A client has approached you with a penetration test requirements. They are concerned with the possibility of external threat, and have invested considerable resources in protecting their Internet exposure. However, their main concern is the possibility of an employee elevating his/her privileges and gaining access to information outside of their respective department. What kind of penetration test would you recommend that would best address the client’s concern? A. A Black Box test B. A Black Hat test C. A Grey Box test D. A Grey Hat test E. A White Box test F. A White Hat test Answer: C QUESTION: 477 In which of the following should be performed first in any penetration test? A. System identification B. Intrusion Detection System testing C. Passive information gathering 218
Image of page 6
EC0-350 D. Firewall testing Answer: C QUESTION: 478 Vulnerability mapping occurs after which phase of a penetration test? A. Host scanning B. Passive information gathering C. Analysis of host scanning D. Network level discovery Answer: C Explanation: The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning. 219
Image of page 7
For More exams visit http s ://killexams.com /vendors-exam-list Kill your exam at First Attempt .... Guaranteed!
Image of page 8

You've reached the end of your free preview.

Want to read all 8 pages?

  • Fall '20
  • Cryptography, Public-key cryptography, Pretty Good Privacy

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture