This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 7. Why is it important to protect files within a file system? 8. What function does an access control list perform? 9. What is Crypt? When/where is it used? 10. What is PGP? 11. What function does TCP Wrappers perform? 12. What is port scanning? 13. Describe some firewall configurations. What are the advantages and disadvantages of each? 14. What are the measures we can take to harden our computer systems? 15. What types of security tasks can be automated?...
View Full Document
This note was uploaded on 01/13/2012 for the course ITC 333 taught by Professor Krishnam during the Three '11 term at Charles Sturt University.
- Three '11