1a) Which of the following is NOT an aspect of access regulated byACLs? a. what authorized users...
Question:
1a)
Which of the following is NOT an aspect of access regulated byACLs?
a.
what authorized users can access
b.
when authorized users can access the system
c.
where the system is located
d.
how authorized users can access the system
1b)
Corruption of information can occur only while information isbeing stored.
True
False
1c)
Which of the following is NOT one of the basic rules that mustbe followed when shaping a policy?
a.
policy must be properly supported and administered
b.
policy must be able to stand up in court if challenged
c.
policy should be agreed upon by all employees and management
d.
policy should never conflict with law
1d)
In the ____________________ attack, an attacker monitors(or sniffs) packets from the network, modifies them, and insertsthem back into the network.
a.
server-in-the-middle
b.
man-in-the-middle
c.
zombie-in-the-middle
d.
sniff-in-the-middle