2011年11月2日星期三

SCNP Strategic Infrastructure Security

1. In the process of public key cryptography, which of the following is true?
A. Only the public key is used to encrypt and decrypt
B. Only the private key can encrypt and only the public key can decrypt
C. Only the public key can encrypt and only the private key can decrypt
D. The private key is used to encrypt and decrypt
E. If the public key encrypts, then only the private key can decrypt
Answer: E
2. During a one week investigation into the security of your network you work on identifying the information that is leaked to the Internet, either directly or indirectly. One thing you decide to evaluate is the information stored in the Whois lookup of your organizational website. Of the following, what pieces of information can be identified via this method?
A. Registrar
B. Mailing Address
C. Contact Name
D. Record Update
E. Network Addresses (Private)
Answer: ABCD

Still remember that half a year ago, one of my student John came to ask me whether it’s good to take some IT certifications such as EX0-107 test training, then we had a half-day discussion with all my class! To my surprise, half of them decided to take the IT exams of EXIN.Inc EX0-107 SCNP Strategic Infrastructure Security, I began to worry about their passing rate till a day they came to tell me that there is no need to worry about that! I was wondering what made them so confident. But they said, it's just a surprise for me!

没有评论:

发表评论