Attackers have been known to search through company trash bins in order to collect potentially useful informat
Attackers have been known to search through company trash bins in order to collect potentially useful information. This method of attack is known as _________________.
The two categories of threats are natural and ___________.
The two categories of threats are natural and ___________.
Accounting, __________, and ____________ are the AAAs of information security.
Accounting, __________, and ____________ are the AAAs of information security.
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the netw
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
The ____________ protocol sends passwords in clear text, while ____________ encrypts passwords.
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic,
Which is a tool used by network administrators to capture packets from a network.
__________ is a tool used by network administrators to capture packets from a network.
What is an electronically generated record that ties a user’s ID to their public key?
A ______________ is an electronically generated record that ties a user’s ID to their public key.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ____
Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.