What are five examples of configuration weaknesses?(1) Unsecured user accounts (2) System accounts with easil6y guessed passwords (3) Misconfigured internet...
What are three examples of Technological Weaknesses?
What are three examples of Technological Weaknesses?(1) TCP/IP Protocol Weaknesses (2) Operating System Weaknesses (3) Network equipment weaknes...
What are the 3 factors of network security?
What are the 3 factors of network security?(1) Vulnerability (2) Threats (3) Att...
What are the three primary vulnerabilities?
What are the three primary vulnerabilities?(1) Technological weaknesses (2) configuration Weaknesses (3) Security Policy Weaknes...
What three goals must a security policy meet?
What three goals must a security policy meet?(1) Informs users, staff, and managers of their requirements for protecting information assets (2) Specifies...
What is an extreme alternative for managing security?
What is an extreme alternative for managing security?Answer: completely closed a network from the outside wo...
What are the two important needs that need to be balanced in a network?
What are the two important needs that need to be balanced in a network?(1) Keep networks open to support business requirements (2) Protect private, personal,...
Subscribe to:
Posts (Atom)