NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
In regards to network security, ____ is the policy-driven control of access to systems, data, and dialogues.
|
confidentiality
|
|
integrity
|
|
availability
|
|
access control
|
Explanation:
Detailed explanation-1: -Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address. In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The servers then send all responses to the victim. Most DoS attacks are difficult to detect.
Detailed explanation-2: -"Castle-and-moat” is a network security model in which no one outside the network is able to access data on the inside, but everyone inside the network can.
There is 1 question to complete.