A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:
Respuesta
antivirus
Firewall
Antispyware
Malware
Pregunta 2
Pregunta
A type of Intrusion Detection System (IDS) that relies on the previously established baseline of normal network activity in order to detect intrusions is known as a signature-based IDS.
Respuesta
True
False
Pregunta 3
Pregunta
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
Respuesta
IDS
EFS
TPM
AES
Pregunta 4
Pregunta
What is another name given to the window security log events?
Respuesta
Audit trail
System Event
System Trails
Application Trail
Pregunta 5
Pregunta
What is the biggest threat to an organization security ?
Respuesta
Insider
Piggyback
Brute force
Social engineering
Pregunta 6
Pregunta
802.1x is an IEEE standard defining:
Respuesta
Token ring networks
Port-based network access control
VLAN tagging
Wireless networking
Pregunta 7
Pregunta
What is the mitigation action organization take to Defend against risk?
Respuesta
Due diligence
Off boarding
Due Care
Due Process
Pregunta 8
Pregunta
What encryption should you use for commutation with a Wi-FI router?
Respuesta
WPA2
DES
WEP
WPA
Pregunta 9
Pregunta
Which of the following acronyms refers to a firewall controlling access to a web server?
Respuesta
WEP
WAP
WPS
WAF
Pregunta 10
Pregunta
Which of the following actions can be taken by passive IDS? (Select 2 answers)