Countermeasures address security concerns in which of the following categories?
Countermeasures address security concerns in which of the following categories?
Which of these virus incidents did not occur in 1999?
Which of these virus incidents did not occur in 1999? (Choose all that apply)
Risk assessment deals with constant monitoring?
Risk assessment deals with constant monitoring?
The IDEA algorithm (used in PGP) is _______ bits long.
The IDEA algorithm (used in PGP) is _______ bits long.
Which organization(s) are responsible for the timely distribution of information security intelligence data?
Which organization(s) are responsible for the timely distribution of information security intelligence data?
A password audit consists of checking for ____________?
A password audit consists of checking for ____________?
What term describes the amount of risk that remains after the countermeasures have been deployed and the vulne
What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
The most secure method for storing backup tapes is?
The most secure method for storing backup tapes is?
__________ is the most famous Unix password cracking tool.
__________ is the most famous Unix password cracking tool.
What form of encryption do these programs use?
PGP & PEM are programs that allow users to send encrypted messages to each other.
What form of encryption do these programs use?
