A. Perimeter security
A. Static IP addresses
A. Social engineering
C. Biometrics
A. DoS
B. DDoS
B. Biometrics
A. Man-in-the-middle
A. Spoofing
A. Worm
D. ICMP
C. Wi-Fi Protected Access 2 (WPA2)
D. Port security
B. End-user education
C. Social engineering
A. A server is acting as a carrier for a virus.
B. A virus is spreading in your system.
A. Brute-force
A. The isolation of one network from another
C. Login script