Topic 1, Volume A
An achievement in providing worldwide Internet security was the signing of certificates
associated with which of the following protocols?
A Chief Information Security Officer (CISO) wants to implement two-factor authentication within
the company. Which of the following would fulfil the CISO's requirements?
A. Username and password
B. Retina scan and fingerprint scan
C. USB token and PIN
D. Proximity badge and token
Which of the following can a security administrator implement on mobile devices that wil help
prevent unwanted people from viewing the data if the device is left unattended?
A. Screen lock
B. Voice encryption
C. GPS tracking
D. Device encryption
Which of the following would a security administrator implement in order to identify a problem
between two systems that are not communicating properly?
A. Protocol analyzer
B. Baseline report
C. Risk assessment
D. Vulnerability scan