(ISC)2 Certified in Cybersecurity - Exam Prep | 100% Correct Answers | Verified | Latest 2024 Version
_____ combines symmetric cryptography and hashing. A) HMAC B) BMAC C) CMAC D) AMAC - A) HMAC (Hash-Based Message Authentication Code) _______ uses a completely different hash generation approach than SHA-2. A) SHA-1 B) SHA-3 C) SHA-4 D) SHA-5 - B) SHA-3 ________ cloud computing uses a shared responsibility model. A) Private B) Hybrid C) Public D) Community - C) Public ___________ combines resources from two different public cloud vendors. A) PublicB) Hybrid C) Community D) Multi-Cloud - D) Multi-Cloud ___________ firewalls evaluate each connection independently. A) Stateful B) Stateless C) Semi-Stateful D) Semi-Stateless - B) Stateless ___________ is a one-way function that transforms a variable length input into a unique, fixed-length output. - Hash Function ___________ steal computing po
Geschreven voor
- Instelling
- 2 Certified in Cybersecurity
- Vak
- 2 Certified in Cybersecurity
Documentinformatie
- Geüpload op
- 24 mei 2024
- Aantal pagina's
- 57
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
isc2 certified in cybersecurity exam prep 10