Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

9. Which of the following enables preventive measures, such as blocking IP addresses? Select one: a. IDS b. IPS c. TCP d. VPN 10. Which

9.

Which of the following enables preventive measures, such as blocking IP addresses?

Select one:

a. IDS

b. IPS

c. TCP

d. VPN

10.

Which of the following NIDS/NIPS component processes data collected from one or more sensors and looks for suspicious activity?

Select one:

a. Alert generator

b. Analyzer

c. Event processor

d. Mitigation

11.

Which of the following is not true about switches?

Select one:

a. Switches operate at Layer 2 only

b. Switches operate at Layer 3 only

c. Switches operate at both Layer 2 and Layer 3

d. Switches operate at neither Layer 2 nor Layer 3

12.

Which of the following types of firewalls examines packets and keeps packet table of every communication channel?

Select one:

a. Packet Filtering Firewall

b. Proxy Firewall

c. Stateful Packet Inspection Firewall

d. Web Application Firewall

13.

Which of the following is a tool that scans for sensitive information leakage?

Select one:

a. Data Loss Protection

b. Defense Loss Prevention

c. Data Loss Prevention

d. Defense Loss Protection

14.

Which of the following is data that is being sent over a wired or wireless network?

Select one:

a. Data In-Transit

b. Data At-Rest

c. Data In-Use

d. Data On-the-Wire

15.

Which of the following is not true about Social Engineering and Social Media?

Select one:

a. Social Engineering often entices people to give away too much sensitive information

b. People often post sensitive information on social media

c. People seldom post proprietary information on social media

d. Social Media can be used as reconnaissance for Social Engineering attacks

16.

Which of the following is not true about Authentication?

Select one:

a. You should only give the minimum required level of access

b. The minimum required level of access is not sufficient for most organizations

c. SSO is convenient but when breached gives access to everything

d. Improper configuration can lock out users and access to resources

17.

Which of the following is a Firewall ACL that specifies what type of traffic is allowed, and if not allowed, it is denied?

Select one:

a. Implicit Allow

b. Implicit Deny

c. Explicit Allow

d. Explicit Deny

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Basics Computer EngineeringInformation Warehouse Basics From Science

Authors: Odiljon Jakbarov ,Anvarkhan Majidov

1st Edition

620675183X, 978-6206751830

More Books

Students also viewed these Databases questions

Question

LO3 Name the seven categories of HR functions.

Answered: 1 week ago