A security analyst is implementing PKI-based functionality to a web application that has the following requirements:✑ File contains certificate information✑ Certificate chains✑ Root authority certificates✑ Private keyAll of these components will be part of one file and cryptographically protected with a password. Given this scenario, which of the following certificate types should the analyst implement to BEST meet these requirements?
A company is deploying a file-sharing protocol access a network and needs to select a protocol for authenticating clients. Management requests that the service be configured in the most secure way possible. The protocol must also be capable of mutual authentication, and support SSO and smart card logons. Which of the following would BEST accomplish this task?
Joe, the security administrator, sees this in a vulnerability scan report:"The server 10.1.2.232 is running Apache 2.2.20 which may be vulnerable to a mod_cgi exploit.`Joe verifies that the mod_cgi module is not enabled on 10.1.2.232. This message is an example of:
A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?
Which of the following describes the maximum amount of time a mission essential function can operate without the systems it depends on before significantly impacting the organization?
Which of the following is a technical preventive control?