1. Which of the following types of access control seeks to discover evidence of unwanted, unauthorized, or illicit behavior or activity?
2. Define and detail the aspects of password selection that distinguish good password choices from ultimately poor password choices.
A. Difficult to guess or unpredictable
B. Meet minimum length requirements
C. Meet specific complexity requirements
D. All of the above
3. Which of the following is most likely to detect DoS attacks?
A. Host-based IDS
B. Network-based IDS
C. Vulnerability scanner
D. Penetration testing
4. Which of the following is considered a denial of service attack?
A. Pretending to be a technical manager over the phone and ...