TruSecure ICSA Certified Security Associate
Questions, Answers, Braindumps (TU0-001)
passing paper i can truly say that its no more easy
and some question are really tricy. I am really thankful
to www.exams.ws for good exhibits.
Which two assurances does digitally signing a file
or message provide? (choose two)
A. time stamping
B. data integrity
Answer: B, C
When user A wants to digitally sign a message to provide
integrity, user A creates a message digest using a
hashing algorithm and encrypts the
hash using user A's private key.
What is the most significant problem solved by public-key
A. key recovery
B. key exchange
C. key generation
D. key distribution
What is the weakest aspect of the DES cryptographic
algorithm in protecting
A. The complexity of the algorithm makes it too slow
for day-to day use.
B. Automated attacks at guessing all possible keys
have been demonstrated.
C. The block size of the algorithm is too small to
handle large amounts of data.
D. The source code of the algorithm is widely available
and may prove to have flaws.
What are three functions performed by the IPSec protocol?
A. providing encrypted tunnels between gateways
B. providing encrypted multicast traffic across enterprises
C. ensuring integrity of unencrypted data between
D. providing encrypted connections between workstations
Which three are protocols or services used for authentication
Which two does the proxy service SOCKS Version 5 provide?
A. keystroke logging
B. WINS name service
C. TCP-based services
D. Strong authentication schemes
Your Windows PCs rely on n Network Neighborhood to
gain access to resources.
Your users are widely reporting resources missing.
What is likely the problem?
A. You are currently under a denial of service attack.
B. Your systems have been infected with a Trojan Horse.
C. Directed broadcasts have been disabled at your
D. Updated internet firewall rules have prevented
the NBT protocol.
From a network security standpoint, TFTP should be
A. to authenticate to a Web server
B. whenever you need a simple file transfer mechanism
C. in place of FTP to provide better authentication
D. in a limited capacity with the least amount of
It is most likely for unencrypted data to be sniffed
across which connection?
D. Internet OC-3