6 terms

CIW WSA Review


Terms in this set (...)

A registration authority is:
the party responsible for verifying the actual identity of a person or host interested in participating in a PKI scheme.
To secure an e-mail server, you can
forbid relaying to unauthorized users
You have determined that a user account from your own network is responsible for attacking a remote system. What should you do first
Determine whether the account has been compromised
An attack that involves several remote systems that cooperate to wage a coordinated attack that generates an overwhelming amount of network traffic is known as a:
distributed denial-of-service attack
Which of the following is true of packet filter rules?
Rules are read line-by-line; if a packet fails any given rule, it is blocked and subsequent rules are not read
In relation to security, which of the following is the primary benefit of classifying systems?