CORRECT TEXT - (Topic 2)
Fill in the blank with the appropriate value. SHA-1 produces a _____ -bit message digest.
Solution:
SHA-1 produces a160-bit message digest
Does this meet the goal?
Correct Answer:A
- (Topic 1)
You work as a Network Administrator for ABC Inc. The company has a secure wireless network.
However, in the last few days, an attack has been taking place over and over again. This attack is taking advantage of ICMP directed broadcast. To stop this attack, you need to disable ICMP directed broadcasts. Which of the following attacks is taking place?
Correct Answer:A
- (Topic 1)
Which of the following processes is accountable for monitoring an IT Service and detecting when the performance drops beneath adequate limits?
Correct Answer:C
- (Topic 2)
Bluetooth uses the ______ specification in the _____ band with FHSS technology.
Correct Answer:D
- (Topic 2)
The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for uCertify Software Systems Pvt. Ltd.?
(Click the Exhibit button on the toolbar to see the case study.)
Correct Answer:DEGH
- (Topic 1)
In which type of access control do user ID and password system come under?
Correct Answer:C