00:00

QUESTION 31

Which protocol is used for secure email

Correct Answer: D

QUESTION 32

An entity that acts to exploit a target organizations system vulnerabilities is a

Correct Answer: D

QUESTION 33

How do you distinguish Authentication and Identification

Correct Answer: B

QUESTION 34

Selvaa presents a userid and a password to a system in order to log on. Which of the following characteristics must the userid have?

Correct Answer: D

QUESTION 35

An agreement between a cloud service provider and a cloud service customer based on a taxonomy of cloud computing- specific terms

Correct Answer: C