Question 81
Which of the following is a distributed application architecture that partitions tasks or workloads between service providers and service requesters? Each correct answer represents a complete solution. Choose all that apply.
Question 82
FILL BLANK
Fill in the blank with the appropriate term. ______________ encryption is a type of encryption that uses two
keys, i.e., a public key and a private key pair for data encryption. It is also known as public key encryption.
Fill in the blank with the appropriate term. ______________ encryption is a type of encryption that uses two
keys, i.e., a public key and a private key pair for data encryption. It is also known as public key encryption.
Question 83
Which of the following tools examines a system for a number of known weaknesses and alerts the
administrator?
administrator?
Question 84
FILL BLANK
Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control
of a computer system without authorization by the computer owners and/or legitimate managers.
Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control
of a computer system without authorization by the computer owners and/or legitimate managers.
Question 85
Which of the following is a software tool used in passive attacks for capturing network traffic?
