computer networks
26. Which of the following statements about network security is (are) true? A. Risk control strategies "Accept" and "Defer" both imply that no security control is implemented to protect the IT asset in question because no significant threat can affect it or because that IT asset in. insured B. It is best practice for managers to create only one threat scenario for each asset C. Threats to business continuity include disasters while threats to confidentiality include intrusions by employees D. All of the above E. None of the above 27. Which of the following statements about network security is (are) true? A. Traffic anomaly detector and traffic anomaly analyzer protect against DoS attacks B. Packet-level firewalls filter traffic based on signatures of known attacks C. Viruses and spyware are examples of physical security threats D. All of the above E. None of the above 28. Which of the following statements about network security is (are) true? A. Storing critical data in multiple locations is a preventive control B. Using intrusion protection systems is a detective control C. Having a Disaster Recovery Plan is a corrective control D. All of the above E. None of the above 29. Which of the following statements about network security is (are) true? A. ID keys is a variation of asymmetric encryption that provides authentication to prove who sent a message over a network B. A security control is any event that can cause harm to an IT asset, interrupt a server on the network, or cause monetary loss to the organization C. A threat scenario describes how an IT asset can be compromised by a specific threat D. a and b E. a,b and c 30. refers to keeping track of the operation of network circuits to make sure they are working properly. A. Load balancing B. Network monitoring C. Fault tolerance D. Ticket checking E. Fault management 31. Which of the following is NOT an important step in reducing network costs? A. Centralizing help desks B. Using thick clients C. Automating as much of the network management process as possible D. Developing standards for computers on the network E. All steps above are important in reducing network costs