When using the 3DES encryption ( C = E K1 [D K2 [E K1 [P]]] ) , what is the function of P?
Attackers have the ability to use programs that are able to reveal local passwords by placing some kind of a pointer/cursor over the asterisks in a program's password field. The reason that such tools can uncover passwords in some Operating Systems is because:
Your network has been hit by a virus that is infecting the MBR on many of the systems in the network. You are working to repair the damage this virus has done. After two days of non-stop work on the problem, you get things under control. What type of virus was in your network?
You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS 6.0. You are concerned about the overall security of your servers, and are checking with Microsoft for any patches or updates that you might need to apply to your systems. Which of the following would you apply if you need to implement an update to fix a specific problem that addresses a critical, non-security-related bug?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system, if you wish to audit events like access to a file, folder, or printer, which of the following options would you use?