In a client-server system, which of the following control techniques is used to inspect activity from known or unknown users?
Which of the following would be an indicator of the effectiveness of a computer security incident response team?
Which of the following is the MOST effective method for dealing with the spreading of a network worm that exploits vulnerability in a protocol?