A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:
antivirus
Firewall
Antispyware
Malware
A type of Intrusion Detection System (IDS) that relies on the previously established baseline of normal network activity in order to detect intrusions is known as a signature-based IDS.
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
IDS
EFS
TPM
AES
What is another name given to the window security log events?
Audit trail
System Event
System Trails
Application Trail
What is the biggest threat to an organization security ?
Insider
Piggyback
Brute force
Social engineering
802.1x is an IEEE standard defining:
Token ring networks
Port-based network access control
VLAN tagging
Wireless networking
What is the mitigation action organization take to Defend against risk?
Due diligence
Off boarding
Due Care
Due Process
What encryption should you use for commutation with a Wi-FI router?
WPA2
DES
WEP
WPA
Which of the following acronyms refers to a firewall controlling access to a web server?
WAP
WPS
WAF
Which of the following actions can be taken by passive IDS? (Select 2 answers)
Firewall reconfiguration
Closing down connection
Logging
Terminating process
Sending an alert