Name two types of Intrusion Detection Systems ________ and ________.
Name two types of Intrusion Detection Systems ________ and ________.
Which is a program that can be useful in preventing cookies and Java applets from accessing a system.
A ___________ is a program that can be useful in preventing cookies and Java applets from accessing a system.
Which is a tool used by network administrators to capture packets from a network.
__________ is a tool used by network administrators to capture packets from a network.
Accounting, __________, and ____________ are the AAAs of information security.
Accounting, __________, and ____________ are the AAAs of information security.
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the netw
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
The ____________ protocol sends passwords in clear text, while ____________ encrypts passwords.
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic,
Public keys are used for ___________ messages and private keys are used for __________ messages.
Public keys are used for ___________ messages and private keys are used for __________ messages.
What is an electronically generated record that ties a user’s ID to their public key?
A ______________ is an electronically generated record that ties a user’s ID to their public key.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.