Browse by Tags

70-298 Section 4.1 Q&A
Saturday, July 19, 2008 10:26 AM
Define each of the following, with respect to this exam: Autonomy Isolation Security Boundaries Read More...
70-298 section 3 Q&A Answer
Friday, July 18, 2008 8:34 AM
Which of the follow are encryptions that can be used for IPSec? 3DES Data Encryption Standard DES TDES Triple Data Encryption Standard Answer : This is a trick questions, all of them are encryptions that can be used by IPSec. DES is acronym for Data Encryption Standard 3DES & TDES are acronyms for Triple Data Encryption Standard Read More...
70-298 Section 3.3 Q&A
Sunday, July 13, 2008 8:03 PM
Which protocols are excluded from Windows IPSec by default for Windows 2000 & 2003 Server? Read More...
70-298 Section 3.1 Q&A
Wednesday, July 09, 2008 8:18 AM
Place the following within their respective data sensitivity (Government & Business ) and arrange them in order from highest to lowest. Hint 5 in one and 6 in the other. Confidential Confidential Employee Only Legal N-data Partner Public Secret Secret Top Secret Unclassified Read More...
70-298 Section 2.4 Q&A Bonus Answer
Sunday, July 06, 2008 8:21 AM
What does CRL stand for? Answer: Certificate Revocation List Read More...
70-298 Section 2.4 Q&A Bonus
Saturday, July 05, 2008 8:22 AM
What does CRL stand for? Read More...
70-298 Section 2.4 Q&A Answer
Thursday, July 03, 2008 8:18 AM
How many workstations and which ones can use the delta CRL? Clients: 1000 Vista 32 bit 200 Vista 64 bit 123 Windows XP 64-bit 500 Windows XP 32bit 50 Windows 98 27 Windows 95 The application uses the default windows Crypto-API’s Answer : Only Windows 95 and Windows 98 CANNOT use the delta CRL therefore the answer is 1000 Vista 32 bit 200 Vista 64 bit 123 Windows... Read More...
70-298 Section 2.4 Q&A
Wednesday, July 02, 2008 8:19 AM
How many workstations and which ones can use the delta CRL? Clients: 1000 Vista 32 bit 200 Vista 64 bit 123 Windows XP 64-bit 500 Windows XP 32bit 50 Windows 98 27 Windows 95 The application uses the default windows Crypto-API’s Read More...
70-298 Section 2.3 Q&A
Monday, June 30, 2008 12:56 PM
Place these steps in order they occur: CA administrator approves certificate Request is set to pending User check back later to obtain certificate User completes form User request certificate Read More...
70-298 Section 2.2 Q&A answer
Sunday, June 29, 2008 8:59 AM
Which of the follow are Qualified Subordination Constraint types? Application Basic Cross-certification Internet Intranet Name Policy Qualified Answer: Application Basic Name Policy Read More...
70-298 Section 2.2 Q&A
Saturday, June 28, 2008 8:57 AM
Which of the follow are Qualified Subordination Constraint types? Application Basic Cross-certification Internet Intranet Name Policy Qualified Read More...
70-640 Week 4 Q&A Answer
Friday, June 27, 2008 8:36 AM
A user is added into a new security group, When does membership get evaluated? a) Logon b) Every 5 Minutes c) Every 30 minutes d) Logoff Answer a) logon Read More...
70-298 Section 2.1 Bonus Answer
Friday, June 27, 2008 8:10 AM
What are the components of a Public Key Infrastructure? Answer: Digital Certificates Certification Authority (CA) Certification Hierarchy Certificate Revocation List Certificate Policy Statement Read More...
70-298 Section 2.1 Bonus
Thursday, June 26, 2008 8:09 AM
What are the components of a Public Key Infrastructure? Read More...
70-298 Section 2.1 Answer
Wednesday, June 25, 2008 8:06 AM
What are the five pillars of information security? Answer: Authentication Authorization Confidentiality Integrity Nonrepudiation Read More...
More Posts Next page »

This Blog

Archives

Syndication