A _____________________ looks and acts like a legitimate system, but it does not host data of any real value for an attacker.
Category: Uncategorized
Which US Government agency operates flood insurance programs…
Which US Government agency operates flood insurance programs?
What method of dealing with risk occurs when individuals do…
What method of dealing with risk occurs when individuals do a cost/benefit analysis and determined that the cost of the benefits outweighs the cost of the potential losses?
Why would an organization need to periodically test disaster…
Why would an organization need to periodically test disaster recovery and business continuity plans if they’ve already been shown to work?
Pen testers commonly use this tool to automatically execute…
Pen testers commonly use this tool to automatically execute exploits against target systems – it uses a scripting language to allow the automatic execution of common attacks.
Every CISSP must know the OSI model very well. The job of La…
Every CISSP must know the OSI model very well. The job of Layer ___ is to control the dialogues (connections) between computers. This layer establishes, manages, and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes check-pointing, adjournment, termination, and restart procedures.
Known as a stripe of mirrors, it is configured as two or mor…
Known as a stripe of mirrors, it is configured as two or more mirrors (RAID-1) with each mirror configured in a striped (RAID-0) configuration.
Which of the following protocols is said to use a ‘web of tr…
Which of the following protocols is said to use a ‘web of trust’?
It’s highly desirable for a computer system to continue to o…
It’s highly desirable for a computer system to continue to operate even when suffering damage. This ability can be achieved by adding redundancy in the system. What is being described here?
Many privacy laws dictate which of the following rules?
Many privacy laws dictate which of the following rules?