1. Which of the following are critical components of any network security policy (choose all that apply)?
c. Low latency
e. High bandwidth
2. Spoofing attacks can also be referred to as masquerading.
3. What is the most effective countermeasure against password cracking attacks?
a. Not using passwords
b. Using numbers in the password field
c. Encrypting the password using DES
d. Using strong encryption algorithms, such as AES
e. Using a birthday as the password value
4. What is the name of the network attack in . . .
The content below this message is for members only.