More cards in this set

Card 16

Front

Social engineering

Back

Preview of the front of card 16

Card 17

Front

Types of social engineering

Back

Preview of the front of card 17

Card 18

Front

What is phishing?

Back

Preview of the front of card 18

Card 19

Front

SQL

Back

Preview of the front of card 19

Card 20

Front

Network policies

Back

Preview of the front of card 20

Card 21

Front

What are the components of a good network policy

Back

Preview of the front of card 21