Which of the following is used to describe the type of FTP access in which a user does not
have permissions to list the contents of directories, but can access the contents if he knows
the path and file name?
A. Secure FTP
B. Blind FTP
C. Passive FTP
D. Hidden FTP
Which system is designed to analyze, detect, and report on security-related events?
Which of the following viruses is designed to prevent antivirus researchers from examining
its code by using various methods that make tracing and disassembling difficult?
A. Armored virus
B. Stealth virus
C. Multipartite virus
D. Polymorphic virus
Which of the following provides security by implementing authentication and encryption on
Wireless LAN (WLAN)?
Which of the following are the examples of administrative controls?
Each correct answer represents a complete solution. Choose all that apply.
A. Security policy
C. Security awareness training