What is mandatory sign-on? An authentication method that:
Virtual corporations typically use a(n) ___________ for maintaining centralized information assets.
ABC Corporation's network is configured such that a user must log in individually at each server and access control. Which type of authentication is in use?
ABC Corporation's network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?
Which of the following is NOT a Business Continuity Plan (BCP) recovery strategy?
A(n) __________ occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.