Ensuring that an email message has not been intercepted and altered by unauthorized persons is an example of which security goal?
What form of virtualization creates a virtual computing environment that performs like a real computer and operating system?
What is the well-known port of HTTP?
What is it that specifies the objectives, procedures, and processes that protect and secure a specific class of assets against potential threats for an organization?
According to the older of volatility, what data should you capture first?
Data stored in memory
What term describes the knowledge and understanding by network users of the organization's security policies and procedures?
What type of plan do we use to recover after an interruption to business processes?
What is the design concept and implementation approach that has the objective of reducing system or network downtime to its absolute minimum?
What is the malicious software that has the ability to replicate itself and move on to other computers?
What is an unauthorized access point inserted into a wireless network?
Rogue Access Point
After an attacker gains access to a network or application, what is he most likely interested in doing?
What type of system identifies possible intrusions and attempts to stop the intrusion from taking place?
Intrusion prevention system (IPS)