00:00

QUESTION 36

Can be considered to be a fingerprint of the file or message

Correct Answer: A

QUESTION 37

What are registered port used for

Correct Answer: D

QUESTION 38

Which device is used to control traffic flow in network

Correct Answer: D

QUESTION 39

What is the range of well known ports

Correct Answer: A

QUESTION 40

Which access control model is best suited for a large organization with many departments
that have different data access needs

Correct Answer: B