A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:
Answer
antivirus
Firewall
Antispyware
Malware
Question 2
Question
A type of Intrusion Detection System (IDS) that relies on the previously established baseline of normal network activity in order to detect intrusions is known as a signature-based IDS.
Answer
True
False
Question 3
Question
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
Answer
IDS
EFS
TPM
AES
Question 4
Question
What is another name given to the window security log events?
Answer
Audit trail
System Event
System Trails
Application Trail
Question 5
Question
What is the biggest threat to an organization security ?
Answer
Insider
Piggyback
Brute force
Social engineering
Question 6
Question
802.1x is an IEEE standard defining:
Answer
Token ring networks
Port-based network access control
VLAN tagging
Wireless networking
Question 7
Question
What is the mitigation action organization take to Defend against risk?
Answer
Due diligence
Off boarding
Due Care
Due Process
Question 8
Question
What encryption should you use for commutation with a Wi-FI router?
Answer
WPA2
DES
WEP
WPA
Question 9
Question
Which of the following acronyms refers to a firewall controlling access to a web server?
Answer
WEP
WAP
WPS
WAF
Question 10
Question
Which of the following actions can be taken by passive IDS? (Select 2 answers)