A string of characters used to identify a particular user is a(n) ________
Fill in the blank(s) with correct word
password
You might also like to view...
What should you configure in Hyper-V Manager when a set of virtual machines requires an independent network for security purposes?
A. virtual local area network B. independent subnetwork C. host security identifier D. globally unique identifier
You can have as many pinboards as you want, organized by ________ or topic
Fill in the blank(s) with correct word
One purpose of a database is to store data so that information can be obtained easily by asking questions
Indicate whether the statement is true or false
The document ____ makes recommendations for establishing firewall policies and for selecting, configuring, testing, deploying, and managing firewall solutions.
A. SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans B. SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations C. SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy D. SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems