- 论坛徽章:
- 0
|
Answer for Question 1.\r\nB. Security Policy\r\nExplanation: In business, a security policy is a document that states in writing how a company plans to protect the company\'s physical and information technology (IT) assets. A security policy is often considered a \"living document\", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company\'s security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company\'s assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made. \r\n\r\nAnswer for Question 2\r\ncorrect Answer is B\r\nExplanation: A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. Zombies are used by malicious hackers to launch DoS attacks. The hacker sends commands to the zombie through an open port. On command, the zombie computer sends an enormous amount of packets of useless information to a targeted Web site in order to clog the site\'s routers and keep legitimate users from gaining access to the site. The traffic sent to the Web site is confusing and therefore the computer receiving the data spends time and resources trying to understand the influx of data that has been transmitted by the zombies. Compared to programs such as viruses or worms that can eradicate or steal information, zombies are relatively benign as they temporarily cripple Web sites by flooding them with information and do not compromise the site\'s data. Such prominent sites as Yahoo, Amazon and CNN.com were brought down in 2000 by zombie DoS attacks. |
|