Please answer the quetions and some answers maybe have more than one answer : Qu
ID: 656775 • Letter: P
Question
Please answer the quetions and some answers maybe have more than one answer :
Question 1 : Which of the following are reasons to use version control?
A) Record changes to files along with who made the changes and comments explaining the reasons for the changes.
B) Recover previous versions of files.
C) Coordinate or prevent simultaneous changes to the same file by multiple people.
D) Share the latests versions of files with multiple people at multiple sites.
E) Publish files for access by anyone over the Internet.
F) Automatically build multiple versions of an executable program.
Question 1 options:
A, B, C, and E
A, B, C, D, and E
A, B, and C
A and F
Question 2 : Which of the following are common features of network file systems?
A) Integration with operating system services to enable use of POSIX functions such as fopen(), fclose(), fread(), and fwrite() with files accessed over a network.
B) Authentication of users prior to enabling file access over a network.
C) Implementation of the POSIX sockets API.
D) Provision of locks or other mechanisms to control simultaneous access of files by multiple users over network connections.
Question 2 options:
A, B, C, and D
B and D
Only C
A, B, and D
Question 3
Which of the following techniques may be used in isolation to reliably preserve and enforce file ownership and permissions within a network file system?
A) User identification by UID sent over the network prior to enabling file access
B) User authentication with username and password prior to enabling file access
C) User authentication with a network user database like Windows Domains in Active Directory prior to enabling network file access
D) File system level encryption
Question 3 options:
B and C
A, B, and C
A, B, C, and D
B, C, and D
Question 4 : Which of the following are uses of a checksum?
A) Detect single bit error/corruption in a stream of bits with unknown length
B) Detection multi-bit error/corruption within a data file
C) Encryption of a data file
D) Detection of single bit error/corruption within a data file
Question 4 options:
A and D
B and D
A, B, C, and D
A, C, and D
Question 5 : Which of the following statements are true?
A) A Cyclic Redundancy Check (CRC) is similar to a checksum and may be used in any situation where a checksum may be used.
B) A Cyclic Redundancy Check may detect single bit errors in a stream of bits with unknown length.
C) It is not possible for two files containing different bit patterns to have the same Cyclic Redundancy Check value.
D) A Cyclic Redundancy Check encrypts file contents.
Question 5 options:
A, B, C, and D
Only A
A, B, and C
Only B
Question 6 : Which of the following statements are true?
A) MD5 is a cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number.
B) MD5 is used to verify data integrity.
C) MD5 was designed by Ron Rivest in 1991.
D) It is exceedingly unlikely for two files with different contents to unintentionally have the same MD5 hash value, but two files with different contents may be deliberately crafted to have the same MD5 hash value.
Question 6 options:
A and B
A
A, B, C, and D
B and C
Question 7 : Which of the following statements are true?
A) Researchers successfully faked Secure Socket Layer (SSL) certificates prior to revelation of the "Heartbleed" bug.
B) As early as In 1996, cryptographers began recommending the use of other algorithms other than MD5 such as SHA-1.
C) SHA-1 has been proven vulnerable to length-extension and partial-message collision attacks.
D) The RSA cryptosystem is used for most privacy sensitive electronic commercial communications because it has not been broken.
Question 7 options:
A
A, B, C, and D
A and B
A, B, and C
Question 8 : Which of the following is true?
A) SHA-2 is a set of cryptographic hash functions designed by the U.S. National Security Agency (NSA) and published in 2001 by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS).
B) SHA-2 digests (checksums) are 224, 256, 384 or 512 bits.
C) We should unquestioningly trust NSA provided cryptographic hash functions because the NSA has never hidden "back doors" to enable easy unauthorized decryption by governmental organizations.
D) Carnegie Mellon University (CMU) Software Engineering Institute (SEI) now says that SHA-2 "should be considered cryptographically broken and unsuitable for further use.
A)A, B, C, and E
B)A, B, C, D, and E
C)A, B, and C
D)A and F
Explanation / Answer
Answer 1: C) A, B, and C
Answer 6: A, B, C, and D
Answer 10: A, B, and C