1. In which of the following types of architecture is the user responsible for the creation of the private and public key?
❍ A. Decentralized key management
❍ B. Centralized key management
❍ C. Revocation key management
❍ D. Multilevel key management
2. Which of the following standards ensures privacy between communicating applications and clients on the Web and has been designed to replace SSL?
❍ A. Secure Sockets Layer 2
❍ B. Point-to-Point Tunneling Protocol
❍ C. Transport Layer Security
❍ D. Internet Protocol Security
3. Lynn needs access to the Accounting order-entry application but keeps getting an error that indicates inadequate access permissions. Bob assigns Lynn’s account to the Administrator’s group to ...