Practice CIW 1D0-571 Exam Questions
-
-
Page: 1/13
Total 62 Questions
Question No 1
Which of the following user authentications are supported by the SSH - 1 protocol but not by the SSH - 2 protocol? Each correct answer represents a complete solution. Choose all that apply.
Question No 2
Adam wants to encrypt an email message with an asymmetric key encryption scheme, so that he can send it to his friend Andy. Which of the following is the requirement to encrypt the email, so that only Andy can read it?
Question No 3
Which of the following firewalls inspects the actual contents of packets?
Question No 4
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
Question No 5
Place the encryption algorithms in their respective categories. Answer: Explanation: The following are symmetric encryption algorithms: DES RC5 AES Blowfish
-
Page: 1/13
Total 62 Questions
-