What kind of attack has Carol committed?
Recently passed over for an executive promotion, Carol is anxious to hear abouta major company announcement which will most likely reveal the new hire. Knowingthat the PR department does not regularly shred documents, she snoops around thehallways after hours, and finds a memo next to the printer that gives her theinformation that will be released to the public next week. What kind of attack has Carol committed?
n order to flood it with REPLY packets, is called a
An attack in which the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victims system, in order to flood it with REPLY packets, is called a:
Secure Shell (SSH-2) is a strong method to use when
Secure Shell (SSH-2) is a strong method to use when:
Extensible Authentication Protocol Transport Layer Security (EAP-TLS) uses a …
Extensible Authentication Protocol Transport Layer Security (EAP-TLS) uses a _________________________ to enable authentication with an authentication server. EAP-TLS establishes a TLS encrypted tunnel to facilitate ___________________ authentication.
ARP broadcasts messages on the network to find what?
ARP broadcasts messages on the network to find what?
Packets that contain routing information within their headers are referred to as what?
Packets that contain routing information within their headers are referred to as what?
Which is a directory service designed to eliminate the need for duplication across many computers of configura
____________ is a directory service designed to eliminate the need for duplication across many computers of configuration data such as user accounts, host names and addresses, printer information and NFS disk mounts on individual systems, instead using a central repository on a master server, simplifying system administration.
The HVAC system should maintain the appropriate temperature and humidity levels, provide _____________ air-con
The HVAC system should maintain the appropriate temperature and humidity levels, provide _____________ air-conditioning, and _________ pressurization and ventilation.
Which of the following provides the correct definition mapping?
Physical security IDSs can be used to detect intruders by employing electromechanical systems or volumetric systems. Which of the following provides the correct definition mapping?
i. Electromechanical systems work by detecting a change or break in a circuit.
ii. A photoelectric system detects the change in a light beam and thus can be used only in rooms with windows.
iii. A passive infrared system identifies the changes of magnetic waves in an area it is configured to monitor.
iv. An acoustical detection system uses embedded mesh installed on floors, walls, or ceilings.
v. Wave-pattern motion detectors differences in the amplitudes of the waves they monitor.
vi. A proximity detector emits a measurable magnetic field. The detector monitors this magnetic field, and an alarm sounds if the field is completed.
Which of the following is incorrect?
The depth of field is necessary to understand when choosing the correct lenses and configurations for your company’s CCTV. The depth of field refers to the portion of the environment that is in focus when shown on the monitor. Which of the following is incorrect?