What type of attack has occurred?
You work as the security administrator at Certpaper.com. One morning you discover that a user
named Mia Hamm has used her user account to log on to a network server. Mia has then
executed a program and been able to perform operations which only a network administrator or
security administrator should be able to. What type of attack has occurred?
Which of the following should be implemented to automate the selection of the BEST security association for ea
A company has instituted a VPN to allow remote users to connect to the office. As time progresses
multiple security associations are created with each association being more secure. Which of the
following should be implemented to automate the selection of the BEST security association for
each user?
From the options, choose the attack which an IDS (Intrusion Detection System) cannot detect.
From the options, choose the attack which an IDS (Intrusion Detection System) cannot detect.
which of the following for security?
L2TP tunneling replies on which of the following for security?
which of the following?
Non-repudiation is enforced by which of the following?
Which of the following would be the MOST effective backup site for disaster recovery?
Which of the following would be the MOST effective backup site for disaster recovery?
A security system that uses labels to identify objects and requires formal authorization to use is BEST descri
A security system that uses labels to identify objects and requires formal authorization to use is
BEST described as:
what makes unique user IDs especially important?
When reviewing audit trails, what makes unique user IDs especially important?
The model with no single trusted root is known as:
Pretty Good Privacy (PGP) uses a PKI Trust Model where no certificate authority (CA) is
subordinate to another. The model with no single trusted root is known as:
Which is it?
One of these protocols is used to encrypt traffic passed between a web browser and web server.
Which is it?