Question 67

CORRECT TEXT - (Topic 2)
Fill in the blank with the appropriate value. SHA-1 produces a _____ -bit message digest.
Solution:
SHA-1 produces a160-bit message digest

Does this meet the goal?

Correct Answer:A

Question 68

- (Topic 1)
You work as a Network Administrator for ABC Inc. The company has a secure wireless network.
However, in the last few days, an attack has been taking place over and over again. This attack is taking advantage of ICMP directed broadcast. To stop this attack, you need to disable ICMP directed broadcasts. Which of the following attacks is taking place?

Correct Answer:A

Question 69

- (Topic 1)
Which of the following processes is accountable for monitoring an IT Service and detecting when the performance drops beneath adequate limits?

Correct Answer:C

Question 70

- (Topic 2)
Bluetooth uses the ______ specification in the _____ band with FHSS technology.

Correct Answer:D

Question 71

- (Topic 2)
The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for uCertify Software Systems Pvt. Ltd.?
(Click the Exhibit button on the toolbar to see the case study.)

Correct Answer:DEGH

Question 72

- (Topic 1)
In which type of access control do user ID and password system come under?

Correct Answer:C

START GISF EXAM