What is a spoofing attack?
What is a spoofing attack?
Why will it be easy for someone to steal his password?
Abjee is going to log on to his network. His network does not employ traffic padding mechanisms. Why will it be easy for someone to steal his password?
What do the discretionary ACL (access control list) and the system ACL in Windows NT have in common?
What do the discretionary ACL (access control list) and the system ACL in Windows NT have in common?
What does the GINA DLL then do?
Winlogon loads the GINA DLL. What does the GINA DLL then do?
What are the most secure permissions you would apply to the file?
You must apply permissions to a file
named/home/myname/myfile.txt, and you need to fulfill the following requirements:
You want full access to the file.
People in your group should be able to read the file. People in your group should not be able to write the file. People outside of your group should be denied access to the file. What are the most secure permissions you would apply to the file?
What are the security issues that arise in the use of the NFS (Network File System)?
What are the security issues that arise in the use of the NFS (Network File System)?
What is the major security issue with standard NIS (Network Information System)?
What is the major security issue with standard NIS (Network Information System)?
Which of the following choices best defines the Windows NT security account manager?
Which of the following choices best defines the Windows NT security account manager?
Under the level C2 security classification, what does “discretionary access control” mean?
Under the level C2 security classification, what does “discretionary access control” mean?
What is going to be the main obstacle preventing him from success?
1D0-470
Michel wants to write a computer virus that will cripple UNIX systems. What is going to be the main obstacle preventing him from success?