Q1. Kerberos is vulnerable to replay in which of the following circumstances?
A.When a private key is compromised within an allotted time window.
B. When a public key is compromised within an allotted time window.
C. When a ticket is compromised within an allotted time window.
D. When the KSD is compromised within an allotted time window.
Correct Answer: C
Q2. Due care is not related to:
A.Good faith
B. Prudent man
C. Profit
D. Best interest
Correct Answer: C
Q3. What is the most critical characteristic of a biometric identifying system?
A.Perceived intrusiveness
B. Storage requirements
C. Accuracy
D. Scalability
Correct Answer: C
Q4. Related to information security, integrity is the opposite of which of the following?
A.abstraction
B. alteration
C. accreditation
D. application
Correct Answer: B
Q5. In which of the following phases of system development life cycle (SDLC) is contingency planning most important?
A.Initiation
B. Development/acquisition
C. Implementation
D. Operation/maintenance
Correct Answer: A
$ 39
Reviews
There are no reviews yet.