IEC 818
Quiz #3

Q1. In the largest criminal attack to date, (noted in the SANS warning about the Eastern European hackers) hackers were able exploit Windows NT vulnerabilities because
  • Q2. IT Security. An axiom to follow.
  • Q3. Risk Management is a methodology for Q4. Controls over the human factor are called social controls and managing these controls is called Q5. Social engineering, when it refers to IT security, means,