Protection and Security
1. Which of the following are forms of malicious attack?
2. What are the common security threats?
3. From the following, which is not a common file permission?
4. Which of the following is a good practice?
5. What is not a good practice for user administration?
6. Which of the following is the least secure method of authentication?
7. Which of the following is a strong password?
8. Why is one time password safe?
9.
What does Light Directory Access Protocol (LDAP) doesn’t store?
10. What is characteristic of RADIUS system?