A network protocol designed to provide strong authentication for client/server applications by using key cryptography. Which protocol is described?
A. Transmission Control Protocol
B. Extensive Messaging and Presence Protocol
C. Lightweight Directory Access Protocol
D. Kerberos protocol
正解:D
質問 2:
What is the international standard for IT Service Management processes?
A. ISO/IEC 27001
B. ISO 14001
C. ISO/IEC 20000
D. ISO 9001
正解:C
質問 3:
In identity management, how might location information be used?
A. to provide advertisements for local restaurants, determined by GPS
B. to provide the correct version of the application for the user's operating system
C. to determine the user's native language
D. to determine whether the user is connected via a mobile platform
正解:A
質問 4:
In its 2010 Whitepaper the Cloud Security Alliance (CSA) identifies a number of Top threats to Cloud Computing.
What is not identified by the CSA as a threat?
A. insecure application interfaces
B. abuse and nefarious use of Cloud computing
C. lack of good Service level agreements
D. unknown risk profile and account
正解:C
質問 5:
Why is text messaging in automobiles outlawed in many countries?
A. for safety reasons
B. for synchronization reasons
C. for security reasons
D. for financial reasons
正解:A
Kuraishi -
本日、試験受けて参りました。結果見事で合格しました。
この模擬試験で行って、全部覚えれば、間違いなく合格できます。
合格だけなら、この問題集は完璧です。