Information Security MCQs and Notes
V
Q 41. At which two traffic layers do most commercial IDSes generate signatures?
P
Q 42. This is a mechanism for ensuring that only authorized users can copy or use specific software applications.
P
Q 43. This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.
R
Q 44. This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.
P
Q 45. __________ is an electronic or paper log used to track computer activity.
S