00:00

QUESTION 11

- (Topic 2)
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

Correct Answer: BC

QUESTION 12

- (Topic 1)
Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?

Correct Answer: C

QUESTION 13

- (Topic 2)
The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for uCertify Software Systems Pvt. Ltd.?
(Click the Exhibit button on the toolbar to see the case study.)

Correct Answer: DEGH

QUESTION 14

- (Topic 2)
Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ACDF

QUESTION 15

- (Topic 1)
You are configuring the Terminal service. What Protocols are required with Terminal services? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a part of the solution. Choose two.

Correct Answer: BC