Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

computer networks 26. Which of the following statements about network security is (are) true? A. Risk control strategies Accept and Defer both imply that no

computer networks image text in transcribed
26. Which of the following statements about network security is (are) true? A. Risk control strategies "Accept" and "Defer" both imply that no security control is implemented to protect the IT asset in question because no significant threat can affect it or because that IT asset in. insured B. It is best practice for managers to create only one threat scenario for each asset C. Threats to business continuity include disasters while threats to confidentiality include intrusions by employees D. All of the above E. None of the above 27. Which of the following statements about network security is (are) true? A. Traffic anomaly detector and traffic anomaly analyzer protect against DoS attacks B. Packet-level firewalls filter traffic based on signatures of known attacks C. Viruses and spyware are examples of physical security threats D. All of the above E. None of the above 28. Which of the following statements about network security is (are) true? A. Storing critical data in multiple locations is a preventive control B. Using intrusion protection systems is a detective control C. Having a Disaster Recovery Plan is a corrective control D. All of the above E. None of the above 29. Which of the following statements about network security is (are) true? A. ID keys is a variation of asymmetric encryption that provides authentication to prove who sent a message over a network B. A security control is any event that can cause harm to an IT asset, interrupt a server on the network, or cause monetary loss to the organization C. A threat scenario describes how an IT asset can be compromised by a specific threat D. a and b E. a,b and c 30. refers to keeping track of the operation of network circuits to make sure they are working properly. A. Load balancing B. Network monitoring C. Fault tolerance D. Ticket checking E. Fault management 31. Which of the following is NOT an important step in reducing network costs? A. Centralizing help desks B. Using thick clients C. Automating as much of the network management process as possible D. Developing standards for computers on the network E. All steps above are important in reducing network costs

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems For Advanced Applications 9th International Conference Dasfaa 2004 Jeju Island Korea March 2004 Proceedings Lncs 2973

Authors: YoonJoon Lee ,Jianzhong Li ,Kyu-Young Whang

2004th Edition

3540210474, 978-3540210474

More Books

Students also viewed these Databases questions

Question

Provide the correct IUPAC name for the compound shown here

Answered: 1 week ago

Question

4. Devise an interview strategy from the interviewers point of view

Answered: 1 week ago