1.
A CEO is concerned about staff browsing inappropriate material on the Internet via HTTPS. If has been suggested that the company purchase a product which could decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. Which of the following type of attacks is similar to this product?
Correct Answer
D. Man-in-the-middle
Explanation
The correct answer is "Man-in-the-middle." In a man-in-the-middle attack, an attacker intercepts and alters communication between two parties without their knowledge. In this scenario, the product suggested by the CEO would act as a man-in-the-middle by intercepting the SSL session, decrypting it, scanning the content for inappropriate material, and then re-encrypting and forwarding it to the intended recipient without the staff knowing. This allows the company to monitor and control the content being accessed without the users being aware of it.
2.
After a system risk assessment was performed it was found that the cost to mitigate the risk was higher than the expected loss if the risk was actualized. In this instance, which of the following is the BEST course of action?
Correct Answer
A. Accept the risk
Explanation
Accepting the risk is the best course of action in this scenario because the cost to mitigate the risk is higher than the expected loss if the risk actually occurs. This means that it would be more cost-effective to accept the risk and deal with any potential losses if they occur, rather than spending more money on trying to mitigate the risk. Running a new risk assessment may not be necessary since the current assessment has already determined that accepting the risk is the best option. Rejecting the risk would not be advisable as it would involve incurring unnecessary costs to mitigate the risk.
3.
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If determining the risk, which of the following is the annual loss expectancy (ALE)?
Correct Answer
D. $7,290
Explanation
The annual loss expectancy (ALE) is calculated by multiplying the annual rate of occurrence (ARO) with the single loss expectancy (SLE). In this case, the ARO is 90% (as stated in the question) and the SLE is the product of the cost to restore services ($90 per hour * 3 hours * 30 staff) which equals $8,100. Therefore, the ALE is $7,290 (90% * $8,100).
4.
A technician is deciding between implementing a HIDS on the database server of implementing a HIDS. Which of the following are reasons why a NIDS may be better to implement? (Select TWO)
Correct Answer(s)
B. Many HIDS are not able to detect network attacks
C. Many HIDS have a negative impact on system performance
Explanation
Many HIDS are not able to detect network attacks because they are primarily designed to monitor and detect activities within the host system, rather than monitoring network traffic. Additionally, many HIDS have a negative impact on system performance as they consume system resources to continuously monitor and analyze activities, leading to slower system performance.
5.
Which of the following scenarios is MOST likely to benefit from using a personal software firewall on a laptop?
Correct Answer
D. Office laptop connected to a home user network
Explanation
An office laptop connected to a home user network is most likely to benefit from using a personal software firewall. When connected to a home user network, the laptop is exposed to various security risks, such as malware and unauthorized access. A personal software firewall can help protect the laptop from these threats by monitoring and controlling incoming and outgoing network traffic, blocking potentially harmful connections, and alerting the user to any suspicious activity. This is especially important in a home user network where the security measures may not be as robust as those in an enterprise LAN or a corporate dial-in server.
6.
Virtualized applications, such as virtualized browsers, are capable of protecting the operating system from which of the following?
Correct Answer
A. Malware installation from suspect Internet sites
Explanation
Virtualized applications, such as virtualized browsers, are capable of protecting the operating system from malware installation from suspect Internet sites. This is because virtualization creates a separate and isolated environment for running applications, including browsers. Any malicious code or malware encountered while browsing suspect Internet sites will be contained within the virtualized environment and will not be able to affect the underlying operating system. This helps to prevent malware infections and enhances the overall security of the system.
7.
A flat or simple role-based access control (RBAC) embodies which of the following principles?
Correct Answer
D. Users assigned to roles, permissions are assigned to roles and users acquire permissions by being a member of the role
Explanation
A flat or simple role-based access control (RBAC) system follows the principle of assigning users to roles. Permissions are then assigned to these roles, and users acquire these permissions by being a member of the role. This means that instead of directly assigning permissions to individual users, permissions are managed at the role level, making it easier to manage access control in large organizations with many users.
8.
A number of unauthorized staff have been entering the data center by piggybacking authorized staff. The CIO has mandated that this behavior stops. Which of the following is the BEST technology to install at the data center to prevent piggybacking?
Correct Answer
A. Mantrap
Explanation
A mantrap is the best technology to install at the data center to prevent piggybacking. A mantrap is a physical access control system that consists of two interlocking doors. Only one door can be open at a time, and individuals must be authenticated and verified before being allowed to enter the data center. This prevents unauthorized staff from entering the data center by piggybacking on authorized staff, as each individual must be verified separately before gaining access. Security badges, hardware locks, and token access may provide some level of security, but they do not offer the same level of protection against piggybacking as a mantrap.
9.
Which of the following is a security threat that hides its processes and files from being easily detected?
Correct Answer
D. Rootkit
Explanation
A rootkit is a type of security threat that hides its processes and files from being easily detected. It is designed to gain unauthorized access to a computer system and maintain control over it without being detected by traditional security measures. Rootkits are often used by hackers to conceal malicious activities and maintain persistent access to a compromised system. They can hide their presence by manipulating system functions and APIs, making it difficult for antivirus software and other security tools to detect and remove them.
10.
Security templates are used for which of the following purposes? Select TWO)
Correct Answer(s)
D. To ensure that all servers start from a common security configuration
E. To ensure that servers are in compliance with the corporate security policy
Explanation
Security templates are used to ensure that all servers start from a common security configuration. This means that all servers will have the same baseline security settings, reducing the risk of vulnerabilities or misconfigurations. Additionally, security templates are used to ensure that servers are in compliance with the corporate security policy. This ensures that all servers adhere to the organization's security standards and guidelines, promoting a consistent and secure environment.
11.
Frequent signature updates are required by which of the following security applications? (Select TWO)
Correct Answer(s)
A. Antivirus
E. IDS
Explanation
Antivirus and IDS (Intrusion Detection System) both require frequent signature updates. Antivirus software needs regular updates to detect and protect against new viruses, malware, and other threats. These updates include new virus definitions and security patches to ensure the antivirus program can effectively identify and remove the latest threats. IDS systems also rely on signature updates to stay current with the latest attack patterns and techniques. By regularly updating the signatures, IDS can detect and alert on new types of attacks, helping to enhance network security.
12.
When choosing an antivirus product, which of the following are the MOST inportant security considerations? (Select TWO)
Correct Answer(s)
A. The frequency of signature updates
E. The number of viruses the software can detect
Explanation
The frequency of signature updates is an important security consideration because antivirus software relies on regularly updated signatures to detect and block new threats. The more frequently the signatures are updated, the more effective the antivirus software will be in protecting against the latest viruses. The number of viruses the software can detect is also important because a larger virus database means a greater chance of detecting and removing malicious software. Both of these factors contribute to the overall effectiveness of the antivirus product in providing security.
13.
Three generally accepted activities of patch management are: determining which patches are needed, applying the patches and which of the following?
Correct Answer
C. Auditing for the successful application of the patches
Explanation
After determining which patches are needed and applying them, the next step in patch management is to audit for the successful application of the patches. This involves checking whether the patches were successfully installed on the systems and if any further actions are required. Auditing helps ensure that the patches are effectively protecting the systems and addressing the vulnerabilities. It allows organizations to identify any issues or gaps in the patch management process and take necessary actions to mitigate risks.
14.
In which of the following situations would it be appropriate to install a hotfix?
Correct Answer
B. A patch is not available and workarounds do not correct the problem
Explanation
When a patch is not available and workarounds do not correct the problem, it would be appropriate to install a hotfix. A hotfix is a software update specifically designed to address a specific issue or problem. In this situation, since no patch is available and the workarounds are not effective, installing a hotfix would be the most suitable solution to fix the problem.
15.
Social engineering, password cracking and vulnerability exploitation are examples of which of the following?
Correct Answer
C. Penetration testing
Explanation
Penetration testing involves simulating real-world attacks to identify vulnerabilities in a system's security. Social engineering, password cracking, and vulnerability exploitation are all techniques used during penetration testing to assess the effectiveness of an organization's security measures. Therefore, the correct answer is penetration testing.
16.
If an administrator does not have a NIDS examining network traffic, which of the following could be used to identify an active attack?
Correct Answer
A. Protocol analyzer
Explanation
A protocol analyzer can be used to identify an active attack if an administrator does not have a NIDS examining network traffic. A protocol analyzer captures and analyzes network traffic, allowing the administrator to inspect the packets and identify any suspicious or malicious activity. By analyzing the protocols and data within the captured packets, the administrator can detect signs of an active attack, such as unusual traffic patterns, unauthorized access attempts, or malicious payloads. Therefore, a protocol analyzer can serve as an effective tool for identifying active attacks in the absence of a NIDS.
17.
Configuration baseline should be taken at which of the following stages in the deployment of a new system?
Correct Answer
D. After initial configuration
Explanation
The configuration baseline should be taken after the initial configuration of the new system. This means that the system has been set up and configured according to the desired specifications and requirements. Taking the configuration baseline at this stage ensures that any changes made during the initial configuration process are captured and documented. It provides a reference point for future comparisons and helps in maintaining the desired configuration state of the system.
18.
Which of the following practices should be implemented to harden workstations and servers?
Correct Answer
B. Install only needed software
Explanation
Installing only needed software is a recommended practice to harden workstations and servers. By installing only necessary software, the attack surface is reduced, minimizing the potential vulnerabilities that could be exploited by malicious actors. Unnecessary software increases the potential attack vectors and can introduce security risks. Therefore, installing only needed software helps to enhance the security posture of workstations and servers.
19.
Which of the following is a mechanism that prevents electromagnetic emanations from being captured?
Correct Answer
C. Faraday cage
Explanation
A Faraday cage is a mechanism that prevents electromagnetic emanations from being captured. It is a shielded enclosure made of conductive material that blocks external electromagnetic fields from entering or escaping. The conductive material absorbs and redirects the electromagnetic energy, effectively isolating the contents inside the cage from external electromagnetic interference. This makes it an effective solution for protecting sensitive electronic equipment or preventing unauthorized access to electromagnetic signals. Installing a repeater, using an uninterruptible power supply (UPS), or disabling SSID broadcast do not provide the same level of protection against electromagnetic emanations as a Faraday cage.
20.
Which of the following describes the difference between a secure cipher and a secure hash?
Correct Answer
C. A cipHer can be reversed, a hash cannot
Explanation
A cipher can be reversed, meaning that it is possible to decrypt the encrypted message and obtain the original message. On the other hand, a hash cannot be reversed, meaning that it is not possible to obtain the original input data from the hash value. This is because a hash function is designed to be one-way, providing a fixed-size output regardless of the input size. In contrast, a cipher is designed to be reversible, allowing for encryption and decryption of data.
21.
Which of the following physical threats is prevented with mantraps?
Correct Answer
A. Piggybacking
Explanation
Mantraps are physical security devices that are designed to prevent unauthorized access to a secure area. They typically consist of a small enclosed space with two or more doors that can only be opened one at a time. The purpose of a mantrap is to ensure that only one person can enter the secure area at a time, preventing piggybacking, which is when an unauthorized person follows closely behind an authorized person to gain access. Therefore, mantraps are specifically used to prevent piggybacking.
22.
Which of the following BEST describes the differences between SHA-1 and MD5?
Correct Answer
B. SHA-1 produces fewer collisions than MD5
Explanation
SHA-1 produces fewer collisions than MD5. This is because SHA-1 is a stronger cryptographic hash function compared to MD5. A collision occurs when two different inputs produce the same hash output. Although both SHA-1 and MD5 can produce fixed-length message digests, SHA-1 has a larger hash size (160 bits) compared to MD5 (128 bits), which makes it less likely to have collisions. However, it is important to note that both SHA-1 and MD5 are considered to be weak and insecure in modern cryptographic applications due to vulnerabilities that have been discovered in their algorithms.
23.
Which of the following BEST applies in the secure disposal of computers?
Correct Answer
B. Computer media must be sanitized
Explanation
The correct answer is "Computer media must be sanitized." This means that when disposing of computers, it is important to ensure that all data stored on the computer's media (such as hard drives or solid-state drives) is properly erased or destroyed to prevent unauthorized access to sensitive information. Sanitizing the media involves using methods such as data wiping or physical destruction to ensure that the data cannot be recovered. This is an essential step in maintaining the security and privacy of the information stored on the computer.
24.
Which of the following BEST describes the differences between RADIUS and TACACS?
Correct Answer
A. TACACS separates authentication, authorization and auditing capabilities
Explanation
TACACS is a protocol that separates the functions of authentication, authorization, and accounting (auditing) into separate components. This allows for more granular control and flexibility in managing user access to network resources. On the other hand, RADIUS (Remote Authentication Dial-In User Service) is also a remote access authentication service but does not provide the same level of separation between these functions as TACACS does. Therefore, the given answer correctly describes the main difference between TACACS and RADIUS.
25.
Which of the following BEST describes the differences between RADIUS and TACACS?
Correct Answer
C. TACACS encrypts client-server negotiation dialog
Explanation
TACACS is a remote access authentication service that encrypts the client-server negotiation dialog. This means that when a client communicates with a server using TACACS, the conversation between them is encrypted to ensure the security and confidentiality of the information exchanged. RADIUS, on the other hand, is also a remote access authentication service but it does not encrypt the client-server negotiation dialog. Therefore, the main difference between RADIUS and TACACS lies in the encryption of the communication between the client and the server.
26.
Which of the following authentication mechanisms performs better in a secure environment?
Correct Answer
B. TACACS because it encrypts client-server negotiation dialog
Explanation
TACACS performs better in a secure environment because it encrypts the client-server negotiation dialog. This encryption ensures that the communication between the client and server is secure and cannot be easily intercepted or tampered with by unauthorized individuals. RADIUS, on the other hand, only encrypts client-server passwords, which is not as comprehensive as encrypting the entire negotiation dialog. Therefore, TACACS is the better choice for authentication in a secure environment.
27.
To evaluate the security compliance of a group of servers against best practices, which of the following BEST applies?
Correct Answer
C. Ran a vulnerability assessment tool
Explanation
To evaluate the security compliance of a group of servers against best practices, the best approach would be to run a vulnerability assessment tool. This tool is designed to identify and assess vulnerabilities in the servers, helping to identify any weaknesses or potential security risks. By running a vulnerability assessment, the organization can gather important information about the servers' security posture and take necessary steps to address any vulnerabilities found. This proactive approach allows for a comprehensive evaluation of the servers' security and helps in implementing appropriate security measures.
28.
Which of the following ia a problem MOST often associated with UTP cable?
Correct Answer
C. Crosstalk
Explanation
Crosstalk is a problem most often associated with UTP (Unshielded Twisted Pair) cable. It occurs when signals from one wire interfere with signals on adjacent wires, causing signal degradation and data errors. This interference is more common in UTP cables due to their lack of shielding, which makes them more susceptible to external electromagnetic interference. Crosstalk can be minimized by using proper cable spacing, twisting the pairs tightly together, and using higher quality cables.
29.
An administrator notices on the monthly firewall log that many of the internal PCs are sending packets on a routine basis to a single external PC. Which of the following BEST describes what is occurring?
Correct Answer
B. The remote PC has a zombie master application running and the local PCs have a zombie slave application running
Explanation
The correct answer is that the remote PC has a zombie master application running and the local PCs have a zombie slave application running. This means that the remote PC is controlling the actions of the local PCs, which are unknowingly sending packets to the external PC. This is a common scenario in a botnet attack, where the attacker gains control over multiple computers to carry out malicious activities.
30.
An administrator notices that a PC is sending an unusual amount of email at odd times of the day. Which of the following should the administrator check for FIRST?
Correct Answer
D. A SMTP open relay
Explanation
The administrator should check for an SMTP open relay as the first step. An SMTP open relay is a misconfigured mail server that allows unauthorized users to send emails through it. This can result in an unusual amount of email being sent from the PC at odd times. By checking for an open relay, the administrator can determine if the PC is being used as a relay for spam or malicious activity.
31.
Which of the following would a password cracker help an administrator to find?
Correct Answer
A. Weak passwords
Explanation
A password cracker is a tool used to test the strength of passwords by attempting to guess or crack them. It uses various techniques such as brute force, dictionary attacks, and rainbow tables to find weak passwords. By identifying weak passwords, an administrator can take necessary actions to strengthen the security of the system, such as enforcing password complexity rules or prompting users to change their passwords.
32.
Which of the following is setup within a router?
Correct Answer
B. DMZ
Explanation
A DMZ (Demilitarized Zone) is a setup within a router that creates a separate network segment, typically between the internal network and the internet, to provide an additional layer of security. It allows for hosting public-facing servers or services, such as web servers, while keeping them isolated from the internal network. This helps to protect the internal network from potential threats or attacks originating from the internet.
33.
Which of the following would BEST allow for fast, highly secure encryption of a USB flash drive?
Correct Answer
D. AES256
Explanation
AES256 would be the best option for fast, highly secure encryption of a USB flash drive. AES (Advanced Encryption Standard) is a symmetric encryption algorithm widely recognized for its security and efficiency. The "256" in AES256 refers to the key size, which is 256 bits, making it extremely difficult to crack. This encryption method is widely used and trusted for securing sensitive data, making it an ideal choice for encrypting a USB flash drive.
34.
When is the best time to discuss the appropriate use of electronic devices with a new employee?
Correct Answer
A. At time of hire
Explanation
The best time to discuss the appropriate use of electronic devices with a new employee is at the time of hire. This is because it is important to establish clear expectations and guidelines regarding the use of electronic devices from the very beginning of the employment relationship. By addressing this topic at the time of hire, the employer can ensure that the new employee understands the company's policies and can start their employment with a clear understanding of what is expected of them in terms of using electronic devices.
35.
Which of the following could BEST assist in the recovery of a crashed hard drive?
Correct Answer
A. Forensics software
Explanation
Forensics software could best assist in the recovery of a crashed hard drive because it is specifically designed to analyze and recover data from damaged or corrupted storage devices. This software can help in identifying and repairing any issues with the hard drive, retrieving lost or deleted files, and reconstructing the file system. It also has advanced features for data carving and disk imaging, which are essential for recovering data from a crashed hard drive. Drive optimization, drive sanitization, and damage and loss control are not directly related to data recovery and would not be as effective in recovering a crashed hard drive.
36.
Which of the following facilitates the creation of an unencrypted tunnel between two devices?
Correct Answer
C. L2TP
Explanation
L2TP (Layer 2 Tunneling Protocol) facilitates the creation of an unencrypted tunnel between two devices. It is a protocol that allows the creation of virtual private networks (VPNs) and is commonly used to establish secure connections over the internet. L2TP does not provide encryption by itself, but it can be combined with other encryption protocols such as IPsec to create a secure and private connection between devices.
37.
Which of the following allows for a secure connection to be made through a web browser?
Correct Answer
C. SSL
Explanation
SSL (Secure Sockets Layer) allows for a secure connection to be made through a web browser. It provides encryption and authentication to ensure that the data transmitted between the web browser and the server is secure and cannot be intercepted or tampered with by unauthorized parties. SSL is commonly used for secure online transactions, such as e-commerce websites, online banking, and secure login pages. It is indicated by a padlock symbol in the web browser's address bar, indicating that the connection is encrypted and secure.
38.
Which of the following is the BEST order in which crucial equipment should draw power?
Correct Answer
D. UPS line conditioner, UPS battery, and backup generator
Explanation
The best order in which crucial equipment should draw power is UPS line conditioner, UPS battery, and backup generator. The UPS line conditioner helps to regulate and stabilize the incoming power supply, ensuring that it is clean and free from fluctuations. The UPS battery provides a backup power source in case of a power outage, allowing for uninterrupted operation. Finally, the backup generator serves as a long-term power solution, providing continuous power supply in the event of an extended outage. This order ensures that the power is conditioned and stable before being stored in the battery and then supplemented by the backup generator if needed.
39.
Which of the following would require a pre-sharing of information before a home user could attach to a neighbors wireless adapter?
Correct Answer
B. SSID broadcasting disabled
Explanation
SSID broadcasting refers to the practice of a wireless network broadcasting its network name (SSID) so that nearby devices can easily locate and connect to it. When SSID broadcasting is disabled, the network name is not visible to other devices, making it necessary for a home user to pre-share the network information (such as the SSID) with their neighbor before they can connect to their wireless adapter. This ensures that only authorized users can access the network, as they would need to know the network name in order to connect.
40.
Which of the following would BEST allow an administrator to quickly find a rogue server on the network?
Correct Answer
B. A network mapper
Explanation
A network mapper would be the best tool for an administrator to quickly find a rogue server on the network. A network mapper is a software tool that scans the network and creates a map of all the devices connected to it. By using a network mapper, the administrator can easily identify any unauthorized or unknown servers that may be present on the network. This allows for quick detection and removal of rogue servers, ensuring the security and integrity of the network.
41.
Which of the following would BEST allow an administrator to quickly find a PC with a blank database administrator password?
Correct Answer
B. Vulnerability scanner
Explanation
A vulnerability scanner is a tool that scans computer systems for potential vulnerabilities and weaknesses. In this scenario, using a vulnerability scanner would be the best option for an administrator to quickly find a PC with a blank database administrator password. The scanner would detect this vulnerability and flag it as a security risk, allowing the administrator to take immediate action to address the issue and secure the system.
42.
An administrator is backing up all server data nightly to a NAS device. Which of the following additional steps should the administrator take for protection from disaster in case the primary site is permanently lost?
Correct Answer
B. Backup all data at a preset interval to tape and store those tapes at a sister site in another city
Explanation
Backing up all data at a preset interval to tape and storing those tapes at a sister site in another city provides protection from disaster in case the primary site is permanently lost. Storing the tapes at a sister site in another city ensures that the backup data is physically located in a different geographical location, reducing the risk of losing the data in case of a catastrophic event such as a fire, flood, or earthquake. This off-site storage strategy helps to ensure business continuity and data recovery in the event of a disaster.
43.
Which of the following is the MOST intrusive on a network?
Correct Answer
A. Penetration testing
Explanation
Penetration testing is the most intrusive on a network because it involves actively attempting to exploit vulnerabilities and gain unauthorized access to the network. This process often includes simulating real-world attacks to identify weaknesses in the network's defenses. In contrast, protocol analyzers, port scanners, and vulnerability testing are less intrusive as they focus on analyzing network traffic, scanning for open ports, and identifying potential vulnerabilities respectively, without actively attempting to breach the network's security.
44.
A single sign-on requires which of the following?
Correct Answer
D. A unified trust model
Explanation
A unified trust model is required for a single sign-on. This means that there needs to be a consistent and standardized system in place that allows users to access multiple applications and systems with just one set of login credentials. This unified trust model ensures that the user's identity and access rights are securely managed across all the different platforms and services they need to use.
45.
All of the following are where backup tapes should be kept EXCEPT:
Correct Answer
C. Near a power line
Explanation
Backup tapes should not be kept near a power line because the electromagnetic field generated by the power line can interfere with the data stored on the tapes. This interference can cause data corruption or loss, rendering the backup tapes useless for data recovery purposes. Therefore, it is important to keep backup tapes away from power lines to ensure the integrity and reliability of the stored data.
46.
All of the following require periodic updates to stay accurate EXCEPT:
Correct Answer
B. Pop-up blocker applications
Explanation
Pop-up blocker applications do not require periodic updates to stay accurate because their purpose is to block unwanted pop-up windows, rather than detecting and protecting against specific threats or vulnerabilities. On the other hand, signature-based HIDS, antivirus applications, and rootkit detection applications need regular updates to ensure that they have the latest information about new threats, viruses, and rootkits in order to effectively detect and prevent them.
47.
Which of the following is the quickest method to create a secure test server for a programmer?
Correct Answer
B. Create a virtual server on existing equipment
Explanation
Creating a virtual server on existing equipment is the quickest method to create a secure test server for a programmer. This is because it eliminates the need to acquire new equipment and allows for the efficient utilization of existing resources. By creating a virtual server, the programmer can isolate and test their applications without affecting the production environment. Additionally, virtual servers offer enhanced security features such as isolation, snapshotting, and the ability to easily revert to previous states, making them an ideal choice for creating secure test environments.
48.
Which of the following is a collection of fixes for an application or operating system that has been tested by the vendor?
Correct Answer
B. A service pack
Explanation
A service pack is a collection of fixes for an application or operating system that has been tested by the vendor. It typically includes updates, enhancements, and patches to address security vulnerabilities, bugs, and performance issues. Service packs are released periodically and are designed to provide a comprehensive solution to known problems, ensuring that the software is up to date and stable. Unlike individual patches or hotfixes, service packs are more extensive and encompass a wider range of updates, making them a reliable and convenient solution for users.
49.
Which of the following usually applies specifically to a web browser?
Correct Answer
B. Pop-up blocker
Explanation
A pop-up blocker is a feature that is typically found in web browsers. It is designed to prevent unwanted pop-up windows from appearing while browsing the internet. Pop-up windows often contain advertisements or other unwanted content, and can be disruptive to the user experience. By blocking these pop-ups, web browsers help to enhance the browsing experience by reducing distractions and potential security risks.
50.
Pre-shared keys apply to which of the following?
Correct Answer
B. PGP
Explanation
Pre-shared keys apply to PGP (Pretty Good Privacy). PGP is a cryptographic protocol that uses a combination of symmetric-key and public-key cryptography to provide encryption and authentication for data communication. Pre-shared keys are symmetric keys that are shared in advance between the communicating parties, allowing them to securely encrypt and decrypt messages. PGP uses these pre-shared keys to establish a secure communication channel and ensure the confidentiality and integrity of the transmitted data.