Matching
Match each item with an statement below:
Premises:
the best defense against viruses.
area in which a broadcast occurs.
usually located outside the network security perimeter as the first line of defense.
software security updates that vendors provide for their application programs and operating systems.
originally used to reduce the amount of traffic on a network.
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
helps prevent computers from becoming infected by different types of spyware.
allows the user to restore specific browser settings if spyware infects the Web browser.
establishes what action the firewall should take when it receives a packet.
Responses:
Broadcast domain
Patch software
Hardware firewalls
Browser Restore
Antivirus software
Rootkit
Segmentation
Rule base
Antispyware
Correct Answer:
Premises:
Responses:
the best defense against viruses.
area in which a broadcast occurs.
usually located outside the network security perimeter as the first line of defense.
software security updates that vendors provide for their application programs and operating systems.
originally used to reduce the amount of traffic on a network.
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
helps prevent computers from becoming infected by different types of spyware.
allows the user to restore specific browser settings if spyware infects the Web browser.
establishes what action the firewall should take when it receives a packet.
Premises:
the best defense against viruses.
area in which a broadcast occurs.
usually located outside the network security perimeter as the first line of defense.
software security updates that vendors provide for their application programs and operating systems.
originally used to reduce the amount of traffic on a network.
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
helps prevent computers from becoming infected by different types of spyware.
allows the user to restore specific browser settings if spyware infects the Web browser.
establishes what action the firewall should take when it receives a packet.
Responses:
Related Questions
Q32: In addition to a hardware firewall that
Q33: Antivirus software definition files are also known
Q34: The Cisco Systems' _ protocol is an
Q35: The drawback of antivirus software is that
Q36: What are the benefits of layering security?
Q37: A(n) _ is a separate network that
Q38: What is security by obscurity?
Q39: The foundation of a firewall is a(n)
Q40: What are some of the features and
Q41: How does Microsoft classify patches?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents