Social Engineering Denial of Service VPN Questions
Social Engineering Denial of Service VPN Questions
Section 13.1 answer either
-
- What are some examples of physical security measures you can implement to protect your network? OR
- Who can prevent and react to security breaches?
- from Section 13.2
- What is social engineering? What is the best defense against social engineering?
- from Section 13.3 answer 1 of the following
- What is the main goal in a Denial of Service (DoS) attack?
- What is the difference between a virus and a worm?
- In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations?
- from Section 13.4 answer 1 of the following
- How does a command injection attack a web application?
- How does salting the hash protect your network?
- From Section 13.5 answer 1 of the following:
- What is the role of a CA in a PKI?
- What does an authentication protocol do?
- from section 13.7 answer 1 of the two questions
- How does a remote access VPN differ from a host-to-host VPN?
- Why are SSL VPNs more likely to be implemented when creating VPNs across the Internet through firewalls that you do not control?