Cyber Security
War driving is a wireless attack. Describe at least four war driving tools and the purpose of each.
Name and describe the four major access control models, and list the restrictions for each.
Passwords can be attacked by many different avenues. Name and describe three attacks against passwords. What are some of the network defenses against such attacks? Provide a brief description of each.
List the account management procedures for securing passwords. Group policy settings allow administrators to set password restrictions on an entire group at the same time. List the attributes, include a description, and recommended settings for this procedure.