00:00

QUESTION 11

When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

Correct Answer: C

QUESTION 12

Which of the following is required to be backed up on a domain controller to recover Active Directory?

Correct Answer: A

QUESTION 13

Which of the following books deals with confidentiality?

Correct Answer: B

QUESTION 14

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as.

Correct Answer: B

QUESTION 15

When are Group Policy Objects (GPOs) NOT applied automatically to workstations?

Correct Answer: C