by MAYODR


keywords:
Bookmark and Share



Front Back
____ensures that only authorized parties can view information
confidentiality
Most key fob based id systems use what authenication method?
username/password and/or token
CGI scripts are vulnerable to what kind of attack?
Cross site scripting
Network cannot be redesigned and server cannot be moved what sec to implement?
Host based IDS and firewall
What describes a server or app that is accepting more input than it is expecting?
Buffer overflow
x of y cards Next >|