00:00

QUESTION 6

Exhibit.
CC dumps exhibit
How many keys would be required to support 50 users in an asymmetric cryptography system?

Correct Answer: A

QUESTION 7

Which type of control is used to restore systems or processes to their normal state after an attack has occurred

Correct Answer: D

QUESTION 8

Which maintains that a user or entity should only have access to the spec data, resources and applications needed to complete a required task.

Correct Answer: C

QUESTION 9

Common network device used to connect networks?

Correct Answer: C

QUESTION 10

A company needs to protect its confidential data from unauthorized access which logical control is best suited for this scenario

Correct Answer: A