Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 22 Which of the below keeps a record of the network traffic permitted to pass through a firewall? A) Intrusion detection system. B) Vulnerability
QUESTION 22 Which of the below keeps a record of the network traffic permitted to pass through a firewall? A) Intrusion detection system. B) Vulnerability scan. C) Log analysis. D) Penetration test. OA. OB OC. OD. QUESTION 23 Residents in Berryhill received an e-mail stating that there is an armed robber on the loose. The e-mail claimed to be from the Berryhill police department, but it wasn't. Computer forensic experts later determined that the e-mail was sent from a computer lab in the Berryhill's public library. The police were then able to uniquely identify the computer that was used by means of its network interface card's address. Security cameras later help the police to reveal the identity of the individual responsible for the hoax. A) IDS B) TCP/IP C) MAC D) DMZ OA. OB. OC OD QUESTION 24 are used to create digital signatures. A) Hashing and packet filtering B) Packet filtering and encryption C) Asymmetric encryption and hashing D) Symmetric encryption and hashing OA. OB Oo oo OC. OD
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started