EICAR is an example of a _____________ used to test AV products without introducing a live virus into the netw
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Which is a tool used by network administrators to capture packets from a network.
__________ is a tool used by network administrators to capture packets from a network.
Accounting, __________, and ____________ are the AAAs of information security.
Accounting, __________, and ____________ are the AAAs of information security.
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
The ____________ protocol sends passwords in clear text, while ____________ encrypts passwords.
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic,
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ____
Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
What is an electronically generated record that ties a user’s ID to their public key?
A ______________ is an electronically generated record that ties a user’s ID to their public key.
Public keys are used for ___________ messages and private keys are used for __________ messages.
Public keys are used for ___________ messages and private keys are used for __________ messages.
A type of virus that resides in a Word or Excel document is called a ___________ virus?
A type of virus that resides in a Word or Excel document is called a ___________ virus?
