Tag: security
Questions Related to security
-
Policy Management
-
Authentication
-
Authorization
-
Accounting
-
Starting and stopping Policy Server processes
-
Configuring Policy Server Executives
-
Cache Management
-
Key Management
-
Global Settings
-
User Management
Correct Option: A,B,C,D,E,F
-
256 MB RAM
-
512 MB RAM
-
1024 MB RAM
-
128 MB RAM
-
Access URL
-
Authentication
-
Authorization
-
Accounting
-
when the user logs off
-
when the session expires
-
when an administrator disables a user
-
when user hits another URL
-
10 seconds
-
30 seconds
-
60 seconds
-
90 seconds
-
The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability
-
Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset
-
Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset
-
All of the above
-
Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset
-
The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability
-
Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset
-
All of the above