Exam 22: Security Hardware

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Just running a RAID Level 5 system means your data are completely safe.

(True/False)
4.7/5
(36)

Wireless networks can be found easily while driving around a neighborhood with a wireless laptop in your car in a technique called ____.

(Multiple Choice)
4.8/5
(40)

Describe the types of doors and locks that should be used to secure an area.

(Essay)
4.9/5
(31)

Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.

(Short Answer)
4.8/5
(37)

Hard drives that can be removed and connected to a running system are called ____ hard drives.

(Multiple Choice)
4.8/5
(35)
Match each item with a statement below.
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Link aggregation
Can be used to combine the bandwidth of two network adapters
Fault tolerance
Computers with two network adapters
Intrusion Detection System
Correct Answer:
Verified
Premises:
Responses:
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Link aggregation
Can be used to combine the bandwidth of two network adapters
Fault tolerance
Computers with two network adapters
Intrusion Detection System
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Multi-homed
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Hardening
(Matching)
4.8/5
(38)
Showing 21 - 26 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)