|
Question 1.
Which of the following is not a category of Intellectual Property?
A. Patents
B. Trademarks
C. Copyrights
D. Manufacturing Standards
E. Trade Secrets
Answer: D
Question 2.
Which of the following can be protected by a patent?
A. A new invention
B. A new product
C. A new process
D. A new name
E. An old product made in a new way
Answer: A, B, C, E
Question 3.
When Windows places a file on a FAT 16 partition, what does it look for, in HEX, to know that a file can be placed in that cluster?
A. 0000
B. FFFF
C. 0001
D. 000F
E. 1111
Answer: A
Question 4.
What is the name of the option in Windows to hide, or append, a second file to a main file?
A. The Hidden Bit
B. Dynamic Link Libraries
C. NTFS Streams
D. File Associations
E. Hidden Server Management
Answer: C
Question 5.
If you capture an 802.11 frame, and the To DS bit is set to zero and the From DS bit is set to zero, what type of WLAN is this frame a part of?
A. Mesh
B. Broadcast
C. Infrastructure
D. Hierarchical
E. Ad Hoc
Answer: E
Question 6.
What transmission system uses short bursts combined together as a channel?
A. Frequency Hopping Spread Spectrum (FHSS)
B. Direct Sequence Spread Spectrum (DSSS)
C. Lamar Anthell Transmission (LAT)
D. Digital Band Hopping (DBH)
E. Digital Channel Hopping (DCH)
Answer: A
Question 7.
When you install and use PGP on your local computer, where is the key pair stored, by default?
A. secret.ring
B. public.ring
C. /usr/bin/pgp
D. pubring.pkr
E. secring.pkr
Answer: D, E
Question 8.
When a biometric system performs a one-to-one mapping, what is the systems doing?
A. Identification
B. Authentication
C. Classification
D. Detection
E. Recognition
Answer: B
Question 9.
If you are going to build a PKI you will need many different components.
What is an industry standard that you can build your PKI upon?
A. Contiguous distinguished name spaces
B. X.509v3 Certificates
C. A defined hierarchy of authorities
D. 128-bit SHA1
E. 128-bit MD5
Answer: B
Question 10.
You are in the process of designing your PKI. You are working on the individual systems and servers that you will need.
Which machine that you install is designed simply to enroll new users into the PKI?
A. Certification Authority
B. Archive Server
C. Security Server
D. Registration Authority
E. Certification Repository
Answer: D
Question 11.
If a Certificate Authority is also designed to accept requests for certificates, then it can be termed as what?
A. A Root CA
B. An Intermediate CA
C. A CA Hierarchy
D. A Registration Authority
E. A Repository
Answer: D
Question 12.
If your goal is to make your CA issue certificates that have specific key usage, what can you use to achieve this goal?
A. This can be done by using unique DNs for each key use that you want.
B. This can be done by using OIDs for each key use that you want.
C. This can be done by using unique CNs for each key use that you want.
D. This can only be done by selecting the key use options during the setup of the CA.
E. This can be done by installing the identifier file for each key use.
Answer: B
|
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.