Give us your feedback!
Question:
A tree-structured DIB is comprised of elements called:
Response:
DAP
PEAR
DIT
EAP
Besides credentials, what might be required to log into a computer system?
authorized account
access rights
token keys
identification
Match the type of security attack with the best definition
brute force
a security attack which uses every possible combination of characters from a predetermined list
dictionary
a security attack which uses every possible word from a predetermined list
cross-site scripting (XSS)
a security attack which injects scripts into web applications
SQL injection
a security attack which injects malicious commands into user input data supplied to web applications
XML injection
a security attack which injects malicious data into user input data supplied to web applications
buffer overflow
a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location
ping flood
a security attack which injects ICMP packets into a network which are targeted to a specific host
smurf attack
a security attack which injects ICMP requests into a network which are targeted from a specific host
To accept or reject a wireless device during a RADIUS authentication, the AP must create a data packet containing verification information called the ________.
access request
accounting request
authentication request
verification request