moris
unread,Feb 13, 2012, 5:10:55 AM2/13/12Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to CISA 201110
不知道有沒有人寫過e-Symposium的題目,通過可以得到CPE..
對了9題(ADBBB BDACA), 第一題忘記co了..
Question 2 of 10
(Edward Ray) For both client (Y) and server (X) authentication, the
SSL Client needs:
A) The personal certificate issued to the client by CA X
B) The client's private key
C) The CA certificate for CA Y or the personal certificate issued to
the server by CA Y
D) A, B and C
E) A and B
F) A and C
Question 3 of 10
(Edward Ray) A Fully Authenticated SSL Certificate is an entry-level
SSL Certificate.
A) True
B) False
Question 4 of 10
(Larry Seltzer) What key strength is considered safe?
A) 512 bits or higher, 1024 recommended
B) 1024 bits or higher, 2048 recommended
C) 2048 bits or higher, 4096 recommended
Question 5 of 10
(Larry Seltzer) Which is the mainstream hash algorithm in use today?
A) SHA-1
B) SHA-2
C) SHA-3
D) MD-5
Question 6 of 10
(Larry Seltzer) Self-signed certificates on the Internet are a bad
idea because:
A) They don't support secure key sizes
B) They can't provide secure authentication
C) They don't work properly with all browsers
D) They don't work properly with all web servers
Question 7 of 10
(Leighton R. Johnson III) How many authentication factors are defined
as strong authentication?
A) Token
B) 1
C) 0
D) 2+
E) All
Question 8 of 10
(Leighton R. Johnson III) What are the 2 types of Identification &
Authentication?
A) User & Device
B) MAC & TCP/IP
C) Network & Local
D) Who & What you are
Question 9 of 10
(Leighton R. Johnson III) User ID’s must be?
A) Very descriptive of the user
B) The same for privilege and non-privilege accounts
C) Unique
D) Private and not documented
Question 10 of 10
(Leighton R. Johnson III) True or False: Authentication method should
provide enhancement of network security through the prevention of
eavesdropping
A) True
B) False