Password crackers fall into two broad categories. What are they?(Choose two)
The Trusted Computer Security Evaluation Criteria book (TCSEC) defines two types of assurance.What are they? (Choose two)
______________ is a major component of an overall risk management program.
An attempt to break an encryption algorithm is called _____________.
If Big Texastelephone company suddenly started billing you for caller ID and call forwarding without your permission, this practice is referred to as __________________.
When an employee leaves the company, their network access account should be __________?
The Internet service that converts www.soundbodyworks.com to 220.127.116.11 is known as:
Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
______________ is a high speed data routing technology also known as X.25.
A ___________ is a signal sent from a receiving machine to another host asking it to slow down the rate at which it is sending information.