Which of the following would a security specialist be able to determine upon examination of a
A. CA public key
B. Server private key
Company policy requires the use if passphrases instead if passwords.
Which of the following technical controls MUST be in place in order to promote the use of
During a routine audit, it is discovered that someone has been using a stale administrator
account to log into a seldom used server. The person has been using the server to view
inappropriate websites that are prohibited to end users.
Which of the following could best prevent this from occurring again?
A. Credential management
B. Group policy management
C. Acceptable use policy
D. Account expiration policy
Which of the following should identify critical systems and components?