|
Question |
Rating |
View Answer |
|
What is worse in Firewall Detection, a false negative or a false positive? |
|
View Answer |
|
Why would you bring in an outside contractor to check the security issues? |
|
View Answer |
|
What is a Honeypot? |
|
View Answer |
|
What is the difference between closed-source and open-source? Which is better? |
|
View Answer |
|
Explain the term DAG (Data Availability Group)? |
|
View Answer |
|
What is the Three-way handshake? How can it be used to create a DOS attack? |
|
View Answer |
|
List the parameters that define an SSL session state? |
|
View Answer |
|
What is the difference between a Black Hat and a White Hat? |
|
View Answer |
|
why is it easier to break into a Windows local account than an AD account? |
|
View Answer |
|
What is ISO 17799? |
|
View Answer |
|
What is an easy way to configure a network to allow only a single computer to login on a particular jack? |
|
View Answer |
|
What do you think of social networking sites such as Facebook and LinkedIn in the context of data Security? |
|
View Answer |
|
Describe Network Intrusion Detection System? |
|
View Answer |
|
What is meant by Recipient Resolution, Routing Resolution and Content Conversion for emails? |
|
View Answer |
|
What is the Chain of Custody? |
|
View Answer |
|
Name the two common techniques used to protect a password file? |
|
View Answer |
|
Why would you want to use SSH from a Windows pc? |
|
View Answer |
|
What are the three ways to authenticate a person? |
|
View Answer |
|
Explain "URL manipulation"? |
|
View Answer |
|
What is SSL and why is it not enough when it comes to encryption? |
|
View Answer |