a. Why are there usually two protocols for each application? b. In e-mail, distinguish between SMTP and POP. c. Why are Telnet and FTP dangerous? d. What secure protocol can be used instead of Telnet and FTP? e. What is the security standards situation in e-mail?
a. Why is it important for firms to understand the threat environment? b. Name the three common security goals. c. Briefly explain each goal. d. What is an incident? e. What are the synonyms for incidents? f. What are countermeasures? g. What are the synonyms for countermeasure? h. What is the goal of countermeasures? i. What are the three types of countermeasures?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here