What are five examples of configuration weaknesses?

What are five examples of configuration weaknesses?



(1) Unsecured user accounts (2) System accounts with easil6y guessed passwords (3) Misconfigured internet services (4) Unsecured default settings within products (5) Misconfigured network equipment


What three goals must a security policy meet?

What three goals must a security policy meet?


(1) Informs users, staff, and managers of their requirements for protecting information assets (2) Specifies the mechanisms through which these requirements can be met (3) Provides a baseline from which to acquire, configure and audit computer systems for compliance