C845 practice test C Questions with Correct
Answers | Updated (100% Correct Answers)
What form of VPN is based on a Transport-layer standard for
encryption that is commonly used for Application-layer protocol
protection?
A
PPTP VPN
B
L2TP VPN
C
SSL VPN
D
IPSec VPN Answer: SSL VPN
When using asymmetric cryptography, what is the purpose of using
the recipient's public key to perform an encryption function on a
data set before sending it to the recipient?
A
© 2025 All rights reserved
,2
To support non-repudiation
B
To restrict delivery
C
To verify integrity
D
To prove the identity of the sender Answer: To restrict delivery
What are the three categories of controls?
This task contains the radio buttons and checkboxes for options.
The shortcut keys to perform this task are A to H and alt+1 to
alt+9.
A
Physical, detective, and logical (technical)
B
Physical, logical (technical), and administrative
C
Administrative, logical (technical), and digital
© 2025 All rights reserved
,3
D
Administrative, physical, and preventative Answer: Physical, logical
(technical), and administrative
Which of the following is a security program used in many banks to
verify the ethics and job performance of a bank manager?
A
Ethical investigation
B
M of N
C
Mandatory cruise
D
Mandatory vacation Answer: Mandatory vacation
Which term is used to indicate the function of access control or
define which subjects can perform various tasks on specific objects?
A
Accessibility
© 2025 All rights reserved
, 4
B
Availability
C
Authorization
D
Authentication Answer: Authorization
What is one of the more complicated legal concerns related to
cloud computing when a legal investigation needs to obtain
evidence, but the evidence may be stored on systems in a
borderless cloud solution spread across multiple countries?
A
Ownership
B
Privacy
C
Jurisdiction
D
© 2025 All rights reserved