Which of the following tools provides a great solution for auditing and testing the recognition and response capabilities of the corporate security defenses?
Which of the following software can be used to protect a computer system from external threats (viruses, worms, malware, or Trojans) and malicious attacks?
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?
Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?