Term
| WEP has all of the following weaknesses of EXCEPT: |
|
Definition
| Even the 128 bit version is vulnerable |
|
|
Term
| Which of the following is NOT a disadvantage of host-based IDS? |
|
Definition
| The IDS must have a process on every system you want to watch. |
|
|
Term
| TCP Ports 989 and 990 are associated with what application? |
|
Definition
|
|
Term
| The hacker was successful in breaching the firewall, the packet filtering router, and the internal firewall, but was quickly detected and unable to get past the workstation personal firewall. This is an example of what principle? |
|
Definition
|
|
Term
| Why construct and implement a PKI? |
|
Definition
| To provide identification to individuals and ensure availability |
|
|