Spam Email
Software Patch
Vulnerability
Audit Trail
Blended Threat
Ciphertext
Encryption
Decryption
Mark it as spam, ignore it, or delete it.
False
Directory Harvest Attack
IP Spoofing
IPSec
L2TP
SSL
WEP
WPA
802.1x
VPN
IEEE 802.**
Audit Policy
Audit Policy Options
Incident Response
Incident Response Procedure
Dual-homed host/firewall
Triple-homed firewall (Aka screened subnet)
DMZ
VLan
Intranet