Which of the following is a technique used to attack an Ethernet wired or wireless network?
Question No 2
Which of the following refers to encrypted text?
Question No 3
Which of the following are the benefits of information classification for an organization?
Question No 4
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those
resources that are required for them. Which of the following access control models will he use?
Question No 5
Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.