Once an attacker gains remote control access over a system, they want to retain this illicit access. Some attackers will block the system update service to prevent new updates from fixing vulnerabilities that are needed to maintain remote control over the compromised system. To prevent such a compromised system from allowing the attacker to access resources on the network, what security mechanism should be implemented?
A. Network access control
B. A Web security gateway
C. Complex password authentication
D. Intrusion detection system
Answer: A. Network access control
You might also like to view...
Give the output from this code fragment:
``` int *p1, *p2; p1 = new int; p2 = new int; *p1 = 10; *p2 = 20; cout << *p1 << “ “ << *p2 << endl; *p1 = *p2; cout << *p1 << “ “ << *p2 << endl; *p1 = 30; cout << *p1 << “ “ << *p2 << endl; ```
Which of the following cannot be used for establishing a link like the one in the accompanying figure?
A. video clip B. text C. image D. image map
A stylus can serve as an alternative to a mouse, simulating clicking and right-clicking
Indicate whether the statement is true or false
To differentiate between the connections, ____ uses multiple public TCP and UDP ports to create unique sockets that map to internal IP addresses.
A. PAT B. static NAT C. dynamic NAT D. virtual NAT