The Trusted Computer Security Evaluation Criteria book (TCSEC) defines two types of assurance…
The Trusted Computer Security Evaluation Criteria book (TCSEC) defines two types of assurance.
What are they? (Choose two)
In order for events to be written to the NT security events log, which function has to be enabled first.
In order for events to be written to the NT security events log, the ___________ function has to be enabled first.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
The Trusted Computer Security Evaluation Criteria book (TCSEC) is also referred to as:
The Trusted Computer Security Evaluation Criteria book (TCSEC) is also referred to as:
The principle of least privilege is effective in helping prevent security breaches, however, prevention works
The principle of least privilege is effective in helping prevent security breaches, however, prevention works best when applied with _______ and ______. Together, these three complete a security triad. (Choose two)
Which of the following are Unix / Linux based security tools?
Which of the following are Unix / Linux based security tools?