During a security assessment, an administrator wishes to see which services are running on a remote server. Which of the following should the administrator use?
A. Port scanner
B. Network sniffer
C. Protocol analyzer
D. Process list
Answer: A
In which of the following categories would creating a corporate privacy policy, drafting acceptable use policies, and group based access control be classified?
A. Security control frameworks
B. Best practice
C. Access control methodologies
D. Compliance activity
Answer: B