Password crackers fall into two broad categories. What are they?
The Trusted Computer Security Evaluation Criteria book (TCSEC) defines two types of assurance.
What are they? (Choose two)
If Big Texastelephone company suddenly started billing you for caller ID and call forwarding without your permission, this practice is referred to as __________________.
When an employee leaves the company, their network access account should be __________?
The Internet service that converts www.soundbodyworks.com to 18.104.22.168 is known as:
______________ is a major component of an overall risk management program.
An attempt to break an encryption algorithm is called _____________.
Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
A _________ refers to hidden code or instructions added to an application or operating system. This code will not execute until appropriate / predetermined conditions are met.
________ attacks generally prevent valid authorized users from gaining access to system resources.