Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network+ Guide Study Set 2
Quiz 8: Network Risk Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?
Question 22
Multiple Choice
Matching Match each correct item with the statement below. -A type ofintrusion detection that protects an entire network and is situatedat the edge of the network or in a network's protectiveperimeter,known as the DMZ (demilitarized zone) .Here,itcan detect many types of suspicious traffic patterns.
Question 23
Short Answer
A _________________ form is a document that is used to ensure that employees are aware of the fact that their use of company equipment and accounts will be monitored and reviewed as needed for security purposes.
Question 24
Multiple Choice
In ACL statements,the any keyword is equivalent to using which wildcard mask?
Question 25
Multiple Choice
What two types of agents are used to check compliance with network security policies?
Question 26
Multiple Choice
What two options below are IDS implementations used to provide additional security on a network?
Question 27
Multiple Choice
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent?
Question 28
Multiple Choice
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?
Question 29
Multiple Choice
Matching Match each correct item with the statement below. -A portion of the security policythat explains to users what they can and cannot do,andpenalties for violations.It might also describe how thesemeasures protect the network's security.
Question 30
Multiple Choice
Matching Match each correct item with the statement below. -A software security flaw that can allow unauthorizedusers to gain access to a system.Legacy systems areparticularly notorious for leaving these kinds of gaps in anetwork's overall security net.
Question 31
Multiple Choice
Matching Match each correct item with the statement below. -A type ofintrusion prevention that runs on a single computer,such as aclient or server,to intercept and help prevent attacks againstthat one host.
Question 32
Multiple Choice
Matching Match each correct item with the statement below. -A program that runs independently and travelsbetween computers and across networks.Although wormsdo not alter other programs as viruses do,they can carryviruses.