List the 8 techniques for preventing vulnerabilities
What is penetration testing? (2 points)
What is network forensics?
What are network policies? (10 points)
policies that ensure:
What are user access levels?
determine the facilities a user has access to
What is encryption?
the process of disguising data so that it cant be understood
What are the three purposes of anti-malware
What are firewalls?
a tool that monitors traffic going into and out of a computer or a network and either allows traffic to pass or blocks it, based on the firewall policy