Term
WEP has all of the following weaknesses of EXCEPT: |
|
Definition
Even the 128 bit version is vulnerable |
|
|
Term
Which of the following is NOT a disadvantage of host-based IDS? |
|
Definition
The IDS must have a process on every system you want to watch. |
|
|
Term
TCP Ports 989 and 990 are associated with what application? |
|
Definition
|
|
Term
The hacker was successful in breaching the firewall, the packet filtering router, and the internal firewall, but was quickly detected and unable to get past the workstation personal firewall. This is an example of what principle? |
|
Definition
|
|
Term
Why construct and implement a PKI? |
|
Definition
To provide identification to individuals and ensure availability |
|
|