MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-Software that can react to suspicious activity.
Correct Answer:
Verified
Q2: The use of certificate authorities to associate
Q5: _ is a public key encryption system
Q7: A security policy should state exactly which
Q8: A _ firewall is a router (or
Q17: An NOS that contains a "back door"is
Q26: MATCHING
Match each item with a statement below:
a.IPS
f.proxy
Q28: A(n) _ identifies an organization's security risks,
Q32: A(n) _ is a software application on
Q34: A VPN _ authenticates VPN clients and
Q37: In general, information is _ if it
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents