Question: 1. An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack? 2. The concept of
1. An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?
2. The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?
3. A ________________ attack prevents legitimate users from accessing normal network resources.
4. A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised is called a ___________ ____________.
5. Your company needs to prevent a new contractor from sharing information with a potential competitor. The contractor needs to sign a ______________ ____________.
6. List and describe the four different locations in which anti-malware can be installed.
7. Hackers may be categorized as follows: white hat, black hat, gray hat. Briefly describe the role of each.
8. What is the biggest difference between encrypted data and hashed data?.
9. Briefly describe an AUP and list at least 4 restrictions that might appear in one.
10. Some of the characteristics that make malware harder to detect and eliminate include encryption, stealth, polymorphism, and ____ ____________.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
