- (Exam Topic 2)
Which of the following algorithms can be used to check the integrity of a file? 158
Each correct answer represents a complete solution. Choose two.
Correct Answer:
AD
- (Exam Topic 1)
Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.
Correct Answer:
ABD
- (Exam Topic 2)
Which of the following schemes is used by the Kerberos authentication?
Correct Answer:
C
- (Exam Topic 2)
The OSI reference model is divided into layers and each layer has a specific task to perform. At which layer of OSI model is the File and Print service performed?
Correct Answer:
D
- (Exam Topic 2)
Fill in the blank with the appropriate encryption system. The _____ encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which is based on the Diffie- Hellman key agreement.
Solution:
ElGamal
Does this meet the goal?
Correct Answer:
A