Question 4 Not yet answered Points out of 20 P Flag question Question 42 Not yet answered Points out of 2.0 PFlag question In a public key infrastructure (PKI) environment, there is a hierarchy of trusted security certificates known as? Select one: O a. X.905/PKI certificates O b. 151.11x/PKI certificates O c. 802.11x/PKI certificates O d. X.509/ PKI certificates Tom is architecting access control for a custom application. He would like to implement a non-discretionary access control method that does not reply upon roles. Which method would meet Tom's criteria? Select one: O a. DAC O b. MAC RBAC d. GBAC
Question 45 Not yet answered Points out of 2.0 Flag question Question 44 Not yet answered Points out of 20 P Rag question This is a lightweight, flexible tunneling protocol that works over IP but does not encrypt data known as? Select one: O a. IP Security protocol (IPSec) O b. Generic routing encapsulation (GRE) Oc Intrusion detection and prevention (IDP) O d. Key management system (KMS) Key exchange is a fundamental aspect of security protocols. Which protocol is used in IPSec protocol to provide key exchange in combination with security associations, so that endpoints can negotiate security settings and exchange encryption keys? Select one: O a L2TP O b. ISAKMP and Oakley Oc PPTP and GRE O
Question 4 Not yet answered Points out of 20 P Flag question Question 42 Not yet answered Points out of 2.0 PFlag questi
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am