A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:
Responda
antivirus
Firewall
Antispyware
Malware
Questão 2
Questão
A type of Intrusion Detection System (IDS) that relies on the previously established baseline of normal network activity in order to detect intrusions is known as a signature-based IDS.
Responda
True
False
Questão 3
Questão
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
Responda
IDS
EFS
TPM
AES
Questão 4
Questão
What is another name given to the window security log events?
Responda
Audit trail
System Event
System Trails
Application Trail
Questão 5
Questão
What is the biggest threat to an organization security ?
Responda
Insider
Piggyback
Brute force
Social engineering
Questão 6
Questão
802.1x is an IEEE standard defining:
Responda
Token ring networks
Port-based network access control
VLAN tagging
Wireless networking
Questão 7
Questão
What is the mitigation action organization take to Defend against risk?
Responda
Due diligence
Off boarding
Due Care
Due Process
Questão 8
Questão
What encryption should you use for commutation with a Wi-FI router?
Responda
WPA2
DES
WEP
WPA
Questão 9
Questão
Which of the following acronyms refers to a firewall controlling access to a web server?
Responda
WEP
WAP
WPS
WAF
Questão 10
Questão
Which of the following actions can be taken by passive IDS? (Select 2 answers)
Responda
Firewall reconfiguration
Closing down connection
Logging
Terminating process
Sending an alert
Quer criar seus próprios Quizzesgratuitos com a GoConqr? Saiba mais.