1.
Choose the terminology or concept which best describes a (Mandatory Access Control) model.
2.
One of the below attacks focus on the cracking of passwords, which one is it?
3.
Which of the following should be done if an audit recording fails in an information system?
4.
The MOST common Certificate Server port required for secure web page access is port:
5.
Which of the following would be an advantage for using PKI over a key server system?
6.
Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received?
7.
Which of the following would be an example of a high-availability disk technology?
8.
Which of the following is commonly used in a distributed denial of service (DDOS) attack?
9.
Which scenario or element would typically cause a CGI (Common Gateway Interface) security issue?
10.
Which of the following types of firewalls provides inspection at layer 7 of the OSI model?