- (Exam Topic 2)
Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?
Correct Answer:
A
- (Exam Topic 1)
Which of the following authentication methods prevents unauthorized execution of code on remote systems?
Correct Answer:
B
- (Exam Topic 1)
Which of the following types of attacks cannot be prevented by technical measures only?
Correct Answer:
A
- (Exam Topic 2)
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?
Correct Answer:
C
- (Exam Topic 1)
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?
Correct Answer:
D