Get ahead with a $300 test prep scholarship
| Enter to win by Tuesday 9/24
CIW WSA Review
Terms in this set (6)
A registration authority is:
the party responsible for verifying the actual identity of a person or host interested in participating in a PKI scheme.
To secure an e-mail server, you can
forbid relaying to unauthorized users
You have determined that a user account from your own network is responsible for attacking a remote system. What should you do first
Determine whether the account has been compromised
An attack that involves several remote systems that cooperate to wage a coordinated attack that generates an overwhelming amount of network traffic is known as a:
distributed denial-of-service attack
Which of the following is true of packet filter rules?
Rules are read line-by-line; if a packet fails any given rule, it is blocked and subsequent rules are not read
In relation to security, which of the following is the primary benefit of classifying systems?
YOU MIGHT ALSO LIKE...
ACC 324 Ch. 8
CISA Questions (701-800)
Corporate Computer Security - Chapters 4 & 5
OTHER SETS BY THIS CREATOR
LECCIÓN 4A. Cuando no trabajo...
Leccion 3B- ¡A comer!
THIS SET IS OFTEN IN FOLDERS WITH...
CIW Web Security 1.2 Review
CIW Web Security 1.3 Review
CIW Web Security 1.4 Review
CIW Web Security 1.5 Review