00:00

QUESTION 46

- (Exam Topic 1)
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?

Correct Answer: C

QUESTION 47

- (Exam Topic 2)
You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm are they most likely using for hashing?

Correct Answer: D

QUESTION 48

- (Exam Topic 2)
Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

Correct Answer: C

QUESTION 49

- (Exam Topic 2)
Which of the following schemes is used by the Kerberos authentication?

Correct Answer: C

QUESTION 50

- (Exam Topic 2)
Which of the following backup types backs up files that have been added and all data that have been modified since the most recent backup was performed?

Correct Answer: B