Save Time & improve Grades
- Questions Asked
- Experts
- Total Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!
Authentication, encryption, and ACLs 1. Which of the following is NOT an authentication protocol: a. Lightweight Directory Authentication Protocol b. Diameter c. RADIUS d. Lightweight Directory Access Protocol 2. An intruder wishes to break in to an application in order to steal information stored there. Because the application utilizes strong authentication, what is the most likely approach the intruder will take? a. Dictionary attack b. Malicious code attack c. Application bypass attack d. Password guessing attack 3. Authentication, encryption, and ACLs are examples of: a. Defense in depth b. Detective controls c. Administrative controls d. Technical controls 4. The categories of controls are: a. Detective, deterrent, preventive, corrective, recovery, and compensating b. Detective, preventive, and deterrent c. Technical, logical, and physical d. Detective, preventive, recovery, and compensating 5. Video surveillance is an example of what type(s) of control: a. Detective and deterrent b. Detective only c. Deterrent only d. Preventive Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help
Ask a question
Experts are online
Answers (1)
Authentication, encryption, and ACLs
Answer Attachments
1 attachments —