NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want to the information security policies.Which of the following are its significant steps?Each correct answer represents a complete solution. Choose two.
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
Which of the following evidences is NOT the potential evidence for Routers?