Questions and Answers

Questions and Answers

    • what do you need to configure two-factor authentication
  • Section 14.1 – answer 1 of the following:
    • how can packet sniffing and port scanning software be used to improve the security of your network?
    • NEW QUESTION: Please describe fileless malware and a zero day attack and why traditional antivirus tends to be ineffective in dealing with these two attacks.
  • section 14.2 – answer 1 of the following:
    • Why should you perform a penetration test on your network?
    • Which type of penetration testing provides you with the most accurate results regarding your network’s vulnerabilities?
    • How does black box testing differ from grey box testing?