An administrator intends to configure an IPSec solution that provides ESP with integrity protection, but not
confidentiality protection.
Which of the following AES modes of operation would meet this integrity-only requirement?
Which of the following is a deployment concept that can be used to ensure only the required OS access is exposed to software applications?
The Chief Technology Officer (CTO) of a company, Ann, is putting together a hardware budget for the next
10 years. She is asking for the average lifespan of each hardware device so that she is able to calculate when she will have to replace each device.
Which of the following categories BEST describes what she is looking for?
A security administrator has written a script that will automatically upload binary and text-based
configuration files onto a remote server using a scheduled task. The configuration files contain sensitive
information.
Which of the following should the administrator use? (Select TWO)
For each of the given items, select the appropriate authentication category from the drop down choices.
Select the appropriate authentication type for the following items:

