Which of the following is a technique used to attack an Ethernet wired or wireless network?
Answer : D
Which of the following refers to encrypted text?
Answer : D
Which of the following are the benefits of information classification for an organization?
Answer : A,C
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?
Answer : A