Documente Academic
Documente Profesional
Documente Cultură
45 AM--30th June19
1-B-clustering
2-A--sender is the only person
3-B-management maY bew distributed
4-A-Operation system
5-A--security value to forefront
6-B-SDLC-software Dev
7-D-Denial of service
8-C-Individual accountability
9-A-prohibition on using corp assets
10-C-test data method
11-C-orderly processing of change req
12-B-Expert
13-A-amplifyin network
14-A-Value off the information
15-A-system permissions
16-D-Conducting BIA
17-A-disturbance of invisible light beams
18-D-encryption
19-B-authentication,authorization,accesss control
20-A-Process by privileged entity
21-D-GSS_API
22-C-Patch panels
23-B-Emergency services
24-A-network routing data
25-D-multilevel
26-B-sustai the org
27-D-block all outbouund
29-C-negligent
30-C-call forwarding
32-D-fiber optic
33-D-- DES
35-D-CHAP
37-B-Ping of death
44-B-Security kernel
46-B-message integrity
54-C-class C
57-B-recommendation
60-A-access control
64-A-maquerading ,submission
67-C-degausssing
68--B-detective
75-D-differential
78-B-7799
80-A-dedicated
83-D-worm attacks
84-D-reverse engg
86-D-digital sig
87-D-module testing
88-D-ISO9001
90-B-content encryprion
91-A-exposure factor
92-B-all IT staff
95--social engg
97-A-OS clock