COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In regards to network security, ____ is the policy-driven control of access to systems, data, and dialogues.
A
confidentiality
B
integrity
C
availability
D
access control
Explanation: 

Detailed explanation-1: -Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address. In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The servers then send all responses to the victim. Most DoS attacks are difficult to detect.

Detailed explanation-2: -"Castle-and-moat” is a network security model in which no one outside the network is able to access data on the inside, but everyone inside the network can.

There is 1 question to complete.