Created by Malachy Moran-Tun
about 3 years ago
|
||
What is a Passive Attack?
What is an Active Attack?
What is an Insider Attack?
What is a Brute Force Attack?
What is a (D)DoS Attack?
What is Malware?
What are some Examples of Actions of Malware?
What are Viruses?
What are Worms?
What are Trojan Horses?
What is Social Engineering?
What is Phishing?
What can Indicate Phishing Emails?
What is SQL Injection?
What is a Network Policy?
What would a Good Network Policy Contain?
What is Penetration Testing?
What is Network Forensics?
What are the Characteristics of a Strong Password?
What are User-Access Levels?
What is Anti-Malware?