When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?
Correct Answer:
C
Which of the following is required to be backed up on a domain controller to recover Active Directory?
Correct Answer:
A
Which of the following books deals with confidentiality?
Correct Answer:
B
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as.
Correct Answer:
B
When are Group Policy Objects (GPOs) NOT applied automatically to workstations?
Correct Answer:
C