Attackers have been known to search through company trash bins in order to collect potentially useful informat
Attackers have been known to search through company trash bins in order to collect potentially useful information. This method of attack is known as _________________.
Which is a program that can be useful in preventing cookies and Java applets from accessing a system.
A ___________ is a program that can be useful in preventing cookies and Java applets from accessing a system.
The two categories of threats are natural and ___________.
The two categories of threats are natural and ___________.
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the netw
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Which is a tool used by network administrators to capture packets from a network.
__________ is a tool used by network administrators to capture packets from a network.
Accounting, __________, and ____________ are the AAAs of information security.
Accounting, __________, and ____________ are the AAAs of information security.
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
The ____________ protocol sends passwords in clear text, while ____________ encrypts passwords.
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic,
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ____
Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.