A.RADIUS B.Password cracker C.Port scanner D.Man-in-the-middle attack
A.A static NAT uses a one to many mapping. B.A static NAT uses a many to one mapping. C.A static NAT uses a many to many mapping. D.A static NAT uses a one to one mapping.
A.Vulnerability assessment B.Imaging software C.Patch management D.Configuration baseline
A.DLL injection B.DDoS attack C.DNS poisoning D.ARP poisoning
A.Signature-based NIPS B.Signature-based NIDS C.Honeypot D.Behavior-based HIDS