- (Exam Topic 2)
An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.
Correct Answer:
ABD
- (Exam Topic 1)
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
Correct Answer:
A
- (Exam Topic 1)
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?
Correct Answer:
B
- (Exam Topic 1)
Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?
Correct Answer:
A
- (Exam Topic 1)
The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
AD