Password crackers fall into two broad categories. What are they?
The Trusted Computer Security Evaluation Criteria book (TCSEC) defines two types of assurance.
What are they? (Choose two)
______________ is a major component of an overall risk management program.
An attempt to break an encryption algorithm is called _____________.
If Big Texastelephone company suddenly started billing you for caller ID and call forwarding without your permission, this practice is referred to as __________________.
When an employee leaves the company, their network access account should be __________?
The Internet service that converts www.soundbodyworks.com to 22.214.171.124 is known as:
Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
A _________ refers to hidden code or instructions added to an application or operating system. This code will not execute until appropriate / predetermined conditions are met.
_____________ is the process of capturing network packets, breaking them apart, and examining the contents.