1. Which of the following is used to validate the integrity of data?
A) MD5
B) Blowfish
C) CBC
D) RSA
2. Which of the following technologies employ the use of SAML? (Select two.)(Select 2answers)
A) RADIUS
B) Secure token
C) Federation
D) LDAP
E) Single sign-on
3. Which of the following terms BEST describes an exploitable vulnerability that exists but has not been publicly disclosed yet?
A) Trojan
B) Logic bomb
C) Design weakness
D) Zero-day
4. Which of the following is the proper order for logging a user into a system from the first step to the last step?
A) Authorization,identification,authentication
B) Authentication,identification,authorization
C) Identification,authorization,authentication
D) Authentication,identification,authorization
E) Identification,authentication,authorization
5. Which of the following scenarios BEST describes an implementation of non-repudiation?
A) A user logs into a domain workstation and access network file shares for another department
B) A user access the workstation registry to make unauthorized changes to enable functionality within an application
C) A user remotely logs into the mail server with another user's credentials
D) A user sends a digitally signed email to the entire finance department about an upcoming meeting
Leave a comment