What is a spoofing attack?
What is a spoofing attack?
Why will it be easy for someone to steal his password?
Abjee is going to log on to his network. His network does not employ traffic padding mechanisms. Why will it be easy for someone to steal his password?
What are the security issues that arise in the use of the NFS (Network File System)?
What are the security issues that arise in the use of the NFS (Network File System)?
What is the major security issue with standard NIS (Network Information System)?
What is the major security issue with standard NIS (Network Information System)?
What do the discretionary ACL (access control list) and the system ACL in Windows NT have in common?
What do the discretionary ACL (access control list) and the system ACL in Windows NT have in common?
What does the GINA DLL then do?
Winlogon loads the GINA DLL. What does the GINA DLL then do?
What are the most secure permissions you would apply to the file?
You must apply permissions to a file
named/home/myname/myfile.txt, and you need to fulfill the following requirements:
You want full access to the file.
People in your group should be able to read the file. People in your group should not be able to write the file. People outside of your group should be denied access to the file. What are the most secure permissions you would apply to the file?
Why is password lockout an effective deterrent to cracking attempts?
Why is password lockout an effective deterrent to cracking attempts?
Which of the following choices best defines the Windows NT security account manager?
Which of the following choices best defines the Windows NT security account manager?
Under the level C2 security classification, what does “discretionary access control” mean?
Under the level C2 security classification, what does “discretionary access control” mean?