You are discussing wireless security with your client. She t…
You are discussing wireless security with your client. She tells you she feels safe with her network as she has implemented MAC filtering on all access points, allowing only MAC addresses from clients she personally configures in each list. You explain this step will not prevent a determined attacker from connecting to this network. Which of the following explains why the APs are still vulnerable?
Read DetailsExamining a database server during routine maintenance, you…
Examining a database server during routine maintenance, you discover an hour of time missing from the log file, during what would otherwise be normal operating hours. Further investigation reveals no user complaints on accessibility. Which of the following is the most likely explanation?
Read DetailsYour company has a document that spells out exactly what emp…
Your company has a document that spells out exactly what employees are allowed to do on their computer systems. It also defines what is prohibited and what consequences await those who break the rules. A copy of this document is signed by all employees prior to their network access. Which of the following best describes this policy?
Read Details