The first “D” in “DDOS” stands for ______________________.
The basic elements of any access control policy are: subjec…
The basic elements of any access control policy are: subject, ____________, and access right.
Which of the following Unix permission strings indicates tha…
Which of the following Unix permission strings indicates that the file’s user owner has permission to read and write the file?
Typically the systems in the _________ require or provide ex…
Typically the systems in the _________ require or provide external connectivity, such as a corporate Web server, an e-mail server, or a DNS server.
Which of the following is NOT one of the three types of reso…
Which of the following is NOT one of the three types of resources that a denial-of-service attack may attempt to exhaust?
To disguise the origin of a packet used in a denial-of-servi…
To disguise the origin of a packet used in a denial-of-service attack, attackers often change the value of the _____________________ field in the IP header.
Once it infects a system, a __________ is very hard to detec…
Once it infects a system, a __________ is very hard to detect, because it installs itself at a low level.
A __________ virus uses scripting code, typically embedded i…
A __________ virus uses scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents.
Which of the following stages of hardening an OS should be d…
Which of the following stages of hardening an OS should be done before the others?
A firewall can protect against attacks that bypass the firew…
A firewall can protect against attacks that bypass the firewall.