Purchasing a virus to use as part of an attempt to steal personal data from a victim machine is a breach of which law
Computer Misuse Act Section 3
Who does GDPR apply to
any business selling goods/services to the EU
what does it mean when a server uses SSHv1.99
The server supports SSHv1.0 and SSHv2.0
a SYN Scan requires what level of privilege
root
On conviction on indictment, what is the maximum prison sentence for a breach of Section 2 of the CMA
5 years
In SNMP what does a MIB stand for
Management Information Base
What year was the Computer Misuse Act created
1990
For section 2 of the computer misuse act to have been broken the following is true
The crime conducted after the unauthorised access does not *have* to use a computer
Which of the following types of memory is non-volatile?
Hard drive
In an environment using Dynamic Access control, who controls access to assets?
Asset owners