Module 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If you lose your wallet or purse and it ends up in the wrong hands, several pieces of information could be used to do personal harm to you. These pieces of information include the following: Name and address Driver license number Credit card numbers Date of birth Which of the following classifications does this information fall into?

Personally identifiable information

To prevent server downtime, which of the following components should be installed redundantly in a server system?

Power supply

MTD

Identifies the length of time an organization can survive with a specified service, asset, or process down

What alternative term can be used to describe asymmetric cryptographic algorithms?

public key cryptography

A framework for all of the entities involved in digital certificates for digital certificate management is known as:

public key infrastructure

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

sponge

To obtain a digital certificate and participate in a Public Key Infrastructure (PKI), what must be submitted and where?

Identifying data and a certification request to the registration authority (RA)

When a sender encrypts a message using their own private key, what security service is being provided to the recipient?

Non-repudiation

A system failure has occurred. Which of the following restoration processes would result in the fastest restoration of all data to its most current state?

Restore the full backup and the last differential backup

Which of the following is the most frequently used symmetric key stream cipher?

Ron's Cipher v4 (RC4)

Which of the following does not or cannot produce a hash value of 128 bits?

SHA-1

Which of the following is the strongest hashing algorithm?

SHA-1

Select the secure alternative to the telnet protocol:

SSH

Telnet is inherently insecure because its communications is in plaintext and easily intercepted. Which of the following is an acceptable alternative to Telnet?

SSH

Which protocol does HTTPS use to offer greater security in web transactions?

SSL

You are purchasing a hard disk from an online retailer over the internet. What does your browser use to ensure that others cannot see your credit card number on the internet?

SSL

What form of cryptography is best suited for bulk encryption because it is so fast?

Symmetric key cryptography

Which of the following forms of cryptography is best implemented in hardware?

Symmetric stream

cryptographic hash:

A function that is one-way (nonreversible), has a fixed length output, and is collision resistant.

What is a PKI?

A hierarchy of computers for issuing certificates.

When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?

Bob's private key

Which of the following is a direct protection of integrity?

Digital signature

What is the most obvious means of providing non-repudiation in a cryptography system?

Digital signatures

If this information is disclosed, it could cause severe and permanent damage to military actions.

secret

Digital Signature

A mathematical scheme for demonstrating the authenticity of digital message or document.

Which of the following protocols can TLS use for key exchange? (Select two.)

-RSA -Diffie Hellman

Which of the following tools allow for remote management of servers? (Select two.)

-SSH -telnet

Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)

-TLS -SSL

If a birthday attack is successful, meaning the attacker discovers a password that generates the same hash as that captured from a user's login credentials, which of the following is true? (Select two.)

-a collision was discovered -the discovered password will allow the attacker to log in as the user, even if the discovered password is not the same as the user's password

You've used BitLocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TPM chip, so you've used an external USB flash drive to store the BitLocker startup key. You use EFS to encrypt the C:\Secrets folder and its contents. Which of the following is true in this scenario? (Select two.)

-by default only the user who encrypted the C:\Secrets\confidential.docx file will be able to open it - if the C:\secret\confidential docx file is copy to an external USB flash drive it will be saved in an unencrypted state

Which of the following are true of Triple DES (3DES)? (Select two.)

-uses a 168 bit key -is used in Ipsec

Your network performs a full backup every night. Each Sunday, the previous night's backup tape is archived. On a Wednesday morning, the storage system fails. How many restore operations will you need to perform to recover all of the data?

1

You've used BitLocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TPM chip, so you've used an external USB flash drive to store the BitLocker startup key. Which system components are encrypted in this scenario? (Select two.)

-C:\ volume -Master boot record

IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)

-ESP -AH

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

160 bits

Your network uses the following backup strategy: Full backups every Sunday night Differential backups Monday through Saturday nights On Thursday morning, the storage system fails. How many restore operations will you need to perform to recover all of the data?

2

You have been asked to implement a RAID 5 solution for your network. What is the minimum number of hard disks that can be used to configure RAID 5?

3

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

3DES

Your network uses the following backup strategy: Full backups every Sunday night Incremental backups Monday night through Saturday night On a Thursday morning, the storage system fails. How many restore operations will you need to perform to recover all of the data?

4

What length SSL and TLS keys are generally considered to be strong?

4096

Which of the following cloud storage access services acts as a gatekeeper, extending an organization's security policies into the cloud storage infrastructure?

A cloud access security broker

You want email sent from users in your organization to be encrypted to make messages more secure. Which of the following is an option you can use to enhance the encryption of email messages?

A cryptographic service provider

Pulping

A method for removing all traces of ink from paper by using chemicals and then mashing the paper into pulp.

Symmetric Cryptography

A method of encryption that uses a single key for both encryption and decryption.

Asymmetric Cryptography

A method of encryption that uses two different yet mathematically related keys, one for encryption and one for decryption.

Data Producer

A person responsible for creating or capturing data. Most people in an organization are data producers.

Data Custodian

A person that is responsible for the quality of the data on a day-to-day basis.

Privacy Officer

A person who oversees data activities to ensure they are in compliance with government laws.

Data Consumer

A person who uses data.

Diffusion

A property of a cryptographic algorithm that identifies the amount of change to the ciphertext when there is a change in the input text.

Confusion

A property of a cryptographic algorithm that makes the relationship between the key and ciphertext as complex as possible.

PRNG:

A pseudo-random number generator is an algorithm used to generate a number that is sufficiently random for cryptographic purposes.

Encryption Key

A random string of bits used in an encryption algorithm to scramble and unscramble data.

Data Owner

A senior person in an organization with the authority to make decisions regarding the quality of data created, stored, consumed, and retired.

What type of key or keys are used in symmetric cryptography?

A shared private key

Which of the following best describes high amplification when applied to hashing algorithms?

A small change in the message results in a big change in the hash value.

Wiping

A software-based method of overwriting data to completely destroy all electronic data residing on a hard disk drive or other digital media.

rainbow table:

A table of precomputed hashes used to guess passwords by searching for the hash of a password.

Which standard was approved by NIST in late 2000 as a replacement for DES?

AES

You want to encrypt data on a removable storage device. Which encryption method would you choose to use the strongest method possible?

AES

Challenge Handshake Authentication Protocol (CHAP):

An authentication protocol that periodically reauthenticates.

Which of the following is a mathematical attack that targets the complexity of a cryptosystem's algorithm?

Analytic attack

symmetric cipher:

Any cryptographic algorithm that uses the same key to encrypt and decrypt. DES, AES, and Blowfish are examples.

A PKI is an implementation for managing which type of encryption?

Asymmetric

Generates two different yet mathematically related keys.

Asymmetric

Only the private key can be used to decrypt information.

Asymmetric

The public key can only be used to encrypt information.

Asymmetric

MTTR

Identifies the average amount of time necessary to repair a failed component or to restore operations

Which of the following statements is true when comparing symmetric and asymmetric cryptography?

Asymmetric key cryptography is used to distribute symmetric keys.

What does a differential backup do during the backup?

Backs up all files with the archive bit set and does not reset the archive bit.

What does an incremental backup do during the backup?

Backs up all files with the archive bit set and resets the archive bit.

If two different messages or files produce the same hashing digest, then a collision has occurred. Which form of cryptographic attack exploits this condition?

Birthday attack

You want a security solution that protects the entire hard drive and prevents access even if the drive is moved to another system. Which solution should you choose?

BitLocker

salt:

Bits added to a hash to make it resistant to rainbow table attacks.

This mode can encrypt or decrypt one fixed-length block.

Block Cipher Mode

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

Blowfish

Which of the following attacks typically takes the longest amount of time to complete?

Brute force attack

Which of the following is used in conjunction with a local security authority to generate the private and public key pair used in asymmetric cryptography?

CSP

Which of the following conditions does not result in a certificate being added to the certificate revocation list?

Certificate expiration

A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?

Certificate practice statement (CPS)

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plaintext to see the resulting ciphertext. Which type of attack is this?

Chosen plaintext

Each plaintext block is added to the previous cipher text block and then the result is encrypted with the key.

Cipher Block Chaining Mode

Each cipher text block is fed back into the encryption and then encrypts the next plaintext block.

Cipher Feedback Mode

Which of the following is a recovery site that may have electricity connected, but there are no servers installed and no high-speed data lines present?

Cold site

When two different messages produce the same hash value, what has occurred?

Collision

You create a new document and save it to a hard drive on a file server on your company's network. Then you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing which security goal?

Confidentiality

Which of the following is considered an out-of-band distribution method for private key encryption?

Copying the key to a USB drive

Sender and recipient access a reliable counter that computes a new shared value each time a cipher text block is exchanged.

Counter Mode

Which of the following functions are performed by the TPM?

Create a hash of system components

Hashing algorithms are used to perform what activity?

Create a message digest

What is the primary function of the IKE protocol used with IPsec?

Create a security association between communicating partners.

asymmetric cipher:

Cryptographic algorithms that use two different keys one key to encrypt and another to decrypt. Also called public key cryptography.

Cryptography

Cryptographic protocols that remain secure and resistant to side channel attacks.

Which of the following encryption mechanisms offers the least security because of weak keys?

DES

Which of the following is the weakest symmetric encryption method?

DES

When you dispose of a computer or sell used hardware and it is crucial that none of the data on the hard disks can be recovered. Which of the following actions can you take to ensure that no data is recoverable?

Damage the hard disks so badly that all data remanence is gone.

Which of the following is a technology that tries to detect and stop sensitive data breaches, or data leakage incidents, in an organization?

Data loss prevention

You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. A RAID 1 volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true?

Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.

Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt or a local copy of a security accounts database?

Dictionary

Which backup strategy backs up only files that have the archive bit set, but does not mark them as having been backed up?

Differential

Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RC5, or any other symmetric cryptography solution?

Diffie-Hellman

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?

Diffie-Hellman

At the end of the cryptographic process, output is generated. With one type of output, simple character changes in the plaintext will cause several characters to change in the cipher text. What type of output is this?

Diffusion

What is the U.S. federal government standard for digital signatures?

Digital Signature Algorithm

You manage your company's website. The Web1 server hosts the website. This server has the following configuration: Dual core processor Dual power supplies RAID 5 volume One RAID controller Two 1000 Mbps network adapters Which component is a single point of failure for the website?

Disk controller

Cloud storage is a virtual service, so the infrastructure is the responsibility of the storage provider. Access control should be set as a local file system would be, with no need for the provider to have access to the stored data. You are implementing the following measures to secure your cloud storage: Verifying that security controls are the same as in a physical datacenter. Using data classification policies. Assigning information into categories that determine storage, handling, and access requirements. Assigning information classification based on information sensitivity and criticality. Which of the following is another security measure you can implement?

Disposing of data when it is no longer needed by using specialized tools.

Which of the following security measures encrypts the entire contents of a hard drive?

DriveLock

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

ECC

Implements the Diffie-Hellman key exchange protocol using elliptic curve cryptography

ECDH

Which of the following security solutions would prevent a user from reading a file that she did not create?

EFS

Which form of asymmetric cryptography is based upon Diffie-Hellman?

El Gamal

What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks, and each block is then encrypted separately?

Electronic Code Book

You would like to implement BitLocker to encrypt data on a hard disk, even if it is moved to another system. You want the system to boot automatically without providing a startup key on an external USB device. What should you do?

Enable the TPM in the BIOS

Which of the following DLP implementations can be used to monitor and control access to the physical devices on workstations or servers?

Endpoint DLP

Exist only for the lifetime of a specific communication session

Ephemeral keys

MTBF

Identifies the average lifetime of a system or component

Which of the following is an example of a statistical attack against a cryptosystem?

Exploiting a computer's inability to produce random numbers

Which of the following is an enhanced type of domain digital certificate?

Extended Validation

Which of the following is a secure alternative to FTP that uses SSL for encryption?

FTPS

DLP can be used to identify sensitive files in a file system and then embed the organization's security policy within the file. Which of the following DLP implementations travels with sensitive data files when they are moved or copied?

File-level DLP

Which backup strategy backs up all files from a computer's file system regardless of whether the file's archive bit is set or not and marks them as having been backed up?

Full

What is the main function of a TPM hardware chip?

Generate and store cryptographic keys

Your organization uses the following tape rotation strategy for its backup tapes: The first set of tapes is used for daily backups. At the end of each week, the latest daily backup tape is promoted to the weekly backup tape. At the end of each month, one of the weekly backup tapes is promoted to the monthly backup tape. What kind of backup tape rotation strategy is being used?

Grandfather

Google Cloud, Amazon Web Services, and Microsoft Azure are some of the most widely used cloud storage solutions for enterprises. Which of the following factors prompt companies to take advantage of cloud storage? (Select two.)

Growing demand for storage Need to bring costs down

Which of the following government acts protects medical records and personal health information?

HIPAA

Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer for security?

HTTPS

Which of the following protocols uses port 443?

HTTPS

Which of the following is used to verify that a downloaded file has not been altered?

Hash

Algorithm used for signature verification and data integrity checking.

Hashing

A birthday attack focuses on what?

Hashing algorithms

You have been asked to deploy a network solution that includes an alternate location where operational recovery is provided within minutes of a disaster. Which of the following strategies would you choose?

Hot site

Which of the following password attacks adds appendages to known dictionary words?

Hybrid

Which of the following symmetric cryptography systems does not support a variable block size?

IDEA

Which of the following network layer protocols provides authentication and encryption services for IP-based network traffic?

IPsec

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do?

Implement BitLocker with a TPM.

Which form of cryptanalysis focuses on weaknesses in software, the protocol, or the encryption algorithm?

Implementation attack

If this information is disclosed, it could cause some harm, but not a national disaster.

sensitive but unclassified

Which of the following symmetric block ciphers does not use a variable block length?

International Data Encryption Algorithm (IDEA)

Which aspect of a certificate makes it a reliable and useful mechanism for proving the identity of a person, system, or service on the internet?

It is a trusted third-party.

When should a hardware device be replaced in order to minimize downtime?

Just before it's MTBF is reached

What common method is used to ensure the security and integrity of a root CA?

Keep it in an offline state from the network.

When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred?

Key clustering

In which type of attack does the attacker have access to both the plaintext and the resulting cipher text, but does not have the ability to encrypt the plain text?

Known plaintext

You have a web server on your network that hosts the public website for your company. You want to make sure that the website will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding. Which solution should you implement?

Load balancing

You manage a server that runs your company website. The web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that a second server can respond to requests for website content. Which solution should you implement?

Load balancing

Which of the following is the weakest hashing algorithm?

MD5

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?

Mary's private key

MTTF

Measures the average time to failure of a system or component

When is the best time to apply for a certificate renewal?

Near the end of the certificate's valid lifetime

DLP can be implemented as a software or hardware solution that analyzes traffic in an attempt to detect sensitive data that is being transmitted in violation of an organization's security policies. Which of the following DLP implementations analyzes traffic for data containing such things as financial documents, social security numbers, or key words used in proprietary intellectual property?

Network DLP

How many keys are used with symmetric key cryptography?

One

Which technology was developed to help improve the efficiency and reliability of checking the validity status of certificates in large, complex environments?

Online Certificate Status Protocol

SHA-1 uses which of the following bit length hashing algorithms?

Only 160-bit

Which of the following are backed up during a differential backup?

Only files that have changed since the last full backup.

Which of the following are backed up during an incremental backup?

Only files that have changed since the last full or incremental backup.

Feeds the output blocks back to the block cipher.

Output Feedback Mode

Uses no deterministic algorithm when generating public keys

Perfect forward secrecy

Your disaster recovery plan calls for tape backups stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the fewest tapes, but also allows you to quickly back up and restore files. Which backup strategy would best meet the disaster recovery plan for tape backups?

Perform a full backup once per week and a differential backup the other days of the week.

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private keys

Which of the following is NOT a feature of the cloud storage model of data storage?

Provides access control to the file system stored in the cloud.

Which of the following data destruction techniques uses a punch press or hammer system to crush a hard disk?

Pulverizing

Degaussing

Purges a hard disk by exposing it to high magnetic pulses that destroys all of the data on the disk.

Which of the following disk configurations might sustain losing two disks? (Select two.)

RAID 0+1 RAID 1+0

What option is an advantage RAID 5 has over RAID 1?

RAID 5 improves performance over RAID 1.

Which of the following can be classified as a stream cipher?

RC4

Which version of the Rivest cipher is a block cipher that supports variable bit length keys and variable bit block sizes?

RC5

Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of which are then combined at the end of the process?

RIPEMD

Which of the following algorithms are used in asymmetric encryption? (Select two.)

RSA Diffie-Hellman

Which form of alternate site is the cheapest, but may not allow an organization to recover before reaching their maximum tolerable downtime?

Reciprocal agreement

You have lost the private key that you have used to encrypt files. You need to get a copy of the private key to open some encrypted files. Who should you contact?

Recovery agent

What is the primary security feature that can be designed into a network's infrastructure to protect and support availability?

Redundancy

Which of the following is an entity that accepts and validates information contained within a request for a certificate?

Registration authority

Even if you perform regular backups, what must be done to ensure that you are protected against data loss?

Regularly test restoration procedures

You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations, including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the internet in these locations. Which of the following protocols would be most likely to be allowed through the widest number of firewalls?

SSL

Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?

Sam's public key

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?

Sender's public key

SSL (Secure Sockets Layer) operates at which layer of the OSI model?

Session

Can be reused by multiple communication sessions

Static keys

Generates a single key that is used for both encryption and decryption.

Symmetric

If a message sender encrypts a message with a key and a message receiver decrypts it using the same key, which type of key exchange is taking place?

Symmetric

What technology uses a chip on the motherboard of the computer to provide cryptographic services?

TPM

An SSL client has determined that the Certificate Authority (CA) issuing a server's certificate is on its list of trusted CAs. What is the next step in verifying the server's identity?

The CA's public key must validate the CA's digital signature on the server certificate.

X.509:

The X.509 standard is the most widely used standard for digital certificates.

Non-Repudiation

The assurance that someone cannot deny something.

Which of the following best describes a side-channel attack?

The attack is based on information gained from the physical implementation of a cryptosystem.

Which action is taken when the private key associated with a digital certificate becomes compromised?

The certificate is revoked and added to the Certificate Revocation List.

Certificate revocation should occur under all but which of the following conditions?

The certificate owner has held the certificate beyond the established lifetime timer

When using SSL authentication, what does the client verify first when checking a server's identity?

The current date and time must fall within the server's certificate validity period.

Low Latency

The delay before a transfer of data begins to follow an instruction for its transfer.

Encryption

The process of converting information or data into an code to prevent unauthorized access.

Information Classification

The process of determining what information will be disclosed and how to disclose it to ensure an organization's privacy requirements.

Purging

The removal of sensitive data, making sure that the data cannot be reconstructed by any known technique.

The success of asymmetric encryption is dependent upon which of the following?

The secrecy of the key

Why are brute force attacks always successful?

They test every possible valid combination

How many keys are used with Public Key cryptography?

Two

How many keys are used with asymmetric (public key) cryptography?

Two

Which of the following are characteristics of ECC? (Select two.)

Uses a finite set of values within an algebraic field Asymmetric encryption

Pulverizing

Using a punch press or hammer system to destroy a data storage device.

Which of the following is not a countermeasure against dictionary attacks?

Using short passwords

If your mission-critical services have a maximum tolerable downtime (MTD) (or a recovery time objective [RTO]) of 36 hours, what is the optimum form of recovery site?

Warm

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

asymmetric

You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure?

Website storage

collision:

When two different inputs into a cryptographic hash produce the same output, this is known as a collision.

Collision

When two or more inputs create the same ciphertext.

Sensitive data is monitored by the data loss prevention (DLP) system in four different states. Which of the following is NOT one of the states monitored by DLP?

While a file with sensitive data is being created.

Which standard is most widely used for certificates?

X.509

You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?

Your copy is the same as the copy posted on the website.

Which of the following is NOT an advantage of using cloud storage?

Your organization can purchase additional storage capacity when needed.

What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?

bridge trust

The lowest level of classified information used by the military. Release of this information could cause damage to military efforts.

confidential

What process will remove all private and public keys along with the user's identification information in the CA?

destruction

What type of trust model is used as the basis for most digital certificates used on the Internet?

distributed trust

Which of the following certificates verifies the identity of the entity that has control over the domain name?

domain validation digital certificate

At what stage can a certificate no longer be used for any type of authentication?

expiration

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?

full disk encryption

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

hash

Could cause loss of life or social hardship.

high

Could cause operational harm such as loss of control or loss of public trust.

high

The sender's key is sent to a recipient using a Diffie-Hellman key exchange.

in-band distribution

The sender's key is sent to the recipient using public key cryptography.

in-band distribution

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

integrity

Could cause personal embarrassment or inconvenience.

low

What is used to create session keys?

master secret

Could cause operational harm such as loss of confidence or damage to reputation.

medium

Could cause personal hardship or embarrassment.

medium

The sender's key is burned to a CD and handed to the recipient.

out-of-band distribution

The sender's key is copied to a USB drive and handed to the recipient.

out-of-band distribution

If this information is released, it poses grave consequences to national security.

top secret

This information can be accessed by the public and poses no security threat.

unclassified

Which of the following items are contained in a digital certificate? (Select two.)

validity period public key

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

web server


Set pelajaran terkait

Live Virtual Machine Lab 5.4: Module 05 Troubleshooting Cable Connectivity

View Set

PrepU Chap 46: Assessment and Mgmt of a Patients with Diabetes

View Set

AMT MLT Exam Study Guide/Practice Test #2

View Set

APUSH exam (answers and questions from Khan Academy)

View Set

Chapter 17: The Eastern Mediterranean

View Set