Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.
What kind of attack is Susan carrying on?
Correct Answer:C
As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?
Correct Answer:BCDE
Which service in a PKI will vouch for the identity of an individual or company?
Correct Answer:D
Which of the following describes the characteristics of a Boot Sector Virus?
Correct Answer:C
By using a smart card and pin, you are using a two-factor authentication that satisfies
Correct Answer:B