Configuration baselines should be taken at which of the following stages in the deployment of a new system?
If an administrator does not have a NIDS examining network traffic, which of the following could be used to identify an active attack?
Social engineering, password cracking and vulnerability exploitation are examples of which of the following?