Question 121
A local bank wants to protect their card holder data. The bank should comply with the________standard to ensure the security of card holder data.
Question 122
Which of the following is the best known Windows tool for finding open wireless access points?
Question 123
Which of the following is used in conjunction with smoke detectors and fire alarm systems to improve and
increase public safety?
increase public safety?
Question 124
CORRECT TEXT
Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.
Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.
Question 125
You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server.
What is this?
What is this?
