Zusammenfassung der Ressource
Frage 1
Frage
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:
Antworten
-
antivirus
-
Firewall
-
Antispyware
-
Malware
Frage 2
Frage
A type of Intrusion Detection System (IDS) that relies on the previously established baseline of normal network activity in order to detect intrusions is known as a signature-based IDS.
Frage 3
Frage
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
Frage 4
Frage
What is another name given to the window security log events?
Antworten
-
Audit trail
-
System Event
-
System Trails
-
Application Trail
Frage 5
Frage
What is the biggest threat to an organization security ?
Antworten
-
Insider
-
Piggyback
-
Brute force
-
Social engineering
Frage 6
Frage
802.1x is an IEEE standard defining:
Frage 7
Frage
What is the mitigation action organization take to Defend against risk?
Antworten
-
Due diligence
-
Off boarding
-
Due Care
-
Due Process
Frage 8
Frage
What encryption should you use for commutation with a Wi-FI router?
Frage 9
Frage
Which of the following acronyms refers to a firewall controlling access to a web server?
Frage 10
Frage
Which of the following actions can be taken by passive IDS? (Select 2 answers)
Antworten
-
Firewall reconfiguration
-
Closing down connection
-
Logging
-
Terminating process
-
Sending an alert