Question
9. Which of the following enables preventive measures, such as blocking IP addresses? Select one: a. IDS b. IPS c. TCP d. VPN 10. Which
9.
Which of the following enables preventive measures, such as blocking IP addresses?
Select one:
a. IDS
b. IPS
c. TCP
d. VPN
10.
Which of the following NIDS/NIPS component processes data collected from one or more sensors and looks for suspicious activity?
Select one:
a. Alert generator
b. Analyzer
c. Event processor
d. Mitigation
11.
Which of the following is not true about switches?
Select one:
a. Switches operate at Layer 2 only
b. Switches operate at Layer 3 only
c. Switches operate at both Layer 2 and Layer 3
d. Switches operate at neither Layer 2 nor Layer 3
12.
Which of the following types of firewalls examines packets and keeps packet table of every communication channel?
Select one:
a. Packet Filtering Firewall
b. Proxy Firewall
c. Stateful Packet Inspection Firewall
d. Web Application Firewall
13.
Which of the following is a tool that scans for sensitive information leakage?
Select one:
a. Data Loss Protection
b. Defense Loss Prevention
c. Data Loss Prevention
d. Defense Loss Protection
14.
Which of the following is data that is being sent over a wired or wireless network?
Select one:
a. Data In-Transit
b. Data At-Rest
c. Data In-Use
d. Data On-the-Wire
15.
Which of the following is not true about Social Engineering and Social Media?
Select one:
a. Social Engineering often entices people to give away too much sensitive information
b. People often post sensitive information on social media
c. People seldom post proprietary information on social media
d. Social Media can be used as reconnaissance for Social Engineering attacks
16.
Which of the following is not true about Authentication?
Select one:
a. You should only give the minimum required level of access
b. The minimum required level of access is not sufficient for most organizations
c. SSO is convenient but when breached gives access to everything
d. Improper configuration can lock out users and access to resources
17.
Which of the following is a Firewall ACL that specifies what type of traffic is allowed, and if not allowed, it is denied?
Select one:
a. Implicit Allow
b. Implicit Deny
c. Explicit Allow
d. Explicit Deny
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started