CORRECT TEXT NIPC stands for _____ _____ _____ ______ and is a government organization designed to help protec
CORRECT TEXT
NIPC stands for _____ _____ _____ ______ and is a government organization designed to help
protect our nation’s vital information resources.
CORRECT TEXT SATAN is a _____________ based tool and COPS is a ______________ based tool
CORRECT TEXT
SATAN is a _____________ based tool and COPS is a ______________ based tool
Echo, chargen, finger, and bootp are all examples of?
Echo, chargen, finger, and bootp are all examples of?
The ___________ protocol converts IP addresses (logical) to MAC Addresses (physical)
The ___________ protocol converts IP addresses (logical) to MAC Addresses (physical)
What are the two most critical aspects of risk analysis?
What are the two most critical aspects of risk analysis? (Choose two)
A program that intentionally leaves a security hole or covert method of access is referred to as a ___________
A program that intentionally leaves a security hole or covert method of access is referred to as a
___________.
CORRECT TEXT In order for events to be written to the NT security events log, the ___________ function has to
CORRECT TEXT
In order for events to be written to the NT security events log, the ___________ function has to be
enabled first.
Which of the following is NOT an administrative control?
Which of the following is NOT an administrative control?
CORRECT TEXT Symmetric = private key = secret ________ = public key = shared
CORRECT TEXT
Symmetric = private key = secret ________ = public key = shared
What is a big difference between Java Applets and Active X controls?
What is a big difference between Java Applets and Active X controls?