1. Which of the following utilizes software to perform integration without hardware changes?
A) hyperconvergence B) secure enclaves C) convergence D) sandboxing
2. The data owner has determined all the data classifications of the data he owns. He determines the level of access that will begranted to users. Who should be responsible for implementing the controls?
A) the data owner - s supervisor B) the data custodian C) the data owner D) a security specialist
3. What type of traffic is the SIMPLE protocol designed to secure?
A) presence B) video conferencing C) email D) IM
4. Your organization is planning the deployment of a new remote assistance tool. The security team is trying to determine the level of encryption the selected product must support. Which of the following factors should be the most important consideration?
A) the level supported by the desktops B) the opinion of the third-party vendor C) the strongest available D) the type required by industry regulations
5. Your organization implements a public key infrastructure (PKI) to issue digital certificates to users. Management has requested that you ensure that all the digital certificates that were issued to contractors have been revoked. Which PKI component should you consult?
A) OCSP B) CA C) CRL D) RA
1. Right Answer: A Explanation: Hyperconvergence takes convergence a step further, utilizing software to perform integration without hardware changes. It utilizes virtualization as well. It integrates numerous services that are managed from a single interface.
2. Right Answer: B Explanation: A data custodian should be responsible for implementing the controls.
3. Right Answer: A Explanation: Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE) is designed to secure presence traffic.
4. Right Answer: D Explanation: Many products implement proprietary encryption, but in regulated industries, this type of encryption may not be legal. Always use the level of encryption required by your industry, such as Advanced Encryption Standard (AES).
5. Right Answer: C Explanation: A CRL contains a list of all the certificates that have been revoked. A CA is the entity that creates and signs digital certificates, maintains the certificates, and revokes them when necessary. An RA verifies the requestor s identity, registers the requestor, and passes the request to the CA. The OCSP is an Internet protocol that obtains the revocation status of an X.509 digital certificate.
Leave a comment