Internet Security

  1. Which of the following are concerns with cyber attacks on business?
  2. What does the cryptographic technique RSA stand for?
  3. In the OAuth, "secure access delegation" process, AS stands for which of the following?
  4. Which best describes the security technique IP-in-IP Tunneling?
  5. Suppose that IP address 192.5.48.4 refers to a host running SSH? Which filter parameters should most likely be used on incoming traffic to that address?