Which of the following should he include for his password?
Andreas wants to choose a strong password for his computer. Which of the following should he include for his password?
What is the essential element in the implementation of any security plan?
What is the essential element in the implementation of any security plan?
What is the term for this type of scanning attack?
A malicious user has connected to your system and learned the specifics of your operating system, including its current patch levels and the operating system name. What is the term for this type of scanning attack?
What has most likely occurred?
Your IDS application pages you at 3:00 a.m, and informed you that an attack occurred against your DNS server. You drive to the server site to investigate. You find no evidence of an attack, although the IDS application claims that a remote DNS server waged an attack on port 53 of your intranet DNS server. You check the logs and discover that a zone transfer has occurred. You check your zones and name resolution, and discover that all entries exist, and no unusual entries have been added to the database. What has most likely occurred?
Which of the following is a potential security risk when using CGI scripts?
Which of the following is a potential security risk when using CGI scripts?
Which choice best defines the Windows NT Security Account Manager?
Which choice best defines the Windows NT Security Account Manager?
What can she do to help secure her registry from changes?
Lucy wants to ensure that her Windows NT Server 4.0 and Windows 2000 systems do not incur any unauthorized changes. What can she do to help secure her registry from changes?
Which is included in the formula that Windows NT/2000 uses to create the Security Identifier?
Which is included in the formula that Windows NT/2000 uses to create the Security Identifier?
What type of attack is causing the system to slow down?
A computer on your network is responding very slowly to network requests, and then it stops responding at all. You use a packet sniffer and create a filter that views packets being sent to that host. You see that the host is receiving thousands of ICMP packets a minute. What type of attack is causing the system to slow down?
What is typically the most desirable asset for a hacker to obtain from a company or department?
What is typically the most desirable asset for a hacker to obtain from a company or department?