Studydroid is shutting down on January 1st, 2019


Bookmark and Share

Front Back
____ensures that only authorized parties can view information
Most key fob based id systems use what authenication method?
username/password and/or token
CGI scripts are vulnerable to what kind of attack?
Cross site scripting
Network cannot be redesigned and server cannot be moved what sec to implement?
Host based IDS and firewall
What describes a server or app that is accepting more input than it is expecting?
Buffer overflow
x of y cards Next >|