Sample Questions
Q) Which of the following application security principles include random input data in the program?
a) Brute force attacks
b) sniffing
c) Fuzzing
d) buffer overflow
e) None
Q) Which of the following MUST Matt, the security administrator to implement for checking both the integrity and authenticity of the message, while it requires a shared secret?
a) RIPEMD
b) MD5
c) SHA
d) HMAC
e) None
Q) Which of the following identify the certificates that have been compromised or suspected to be compromised?
a) CRL
b) ACL
c) Product Key escrow
d) CAs
e) None
In order to use the two-way model of trust in the security administrator needs to implement any of the following?
a) DAC
b) IPK
c) HTTPS
d) TPM
e) None