Exam 7: Network Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Matching
-A monitoring technique used by an intrusion detection system (IDS) that uses an algorithm to determine if a threat exists
(Multiple Choice)
4.8/5
(33)
A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:
(Multiple Choice)
4.9/5
(30)
What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
(Multiple Choice)
4.9/5
(43)
What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?
(Essay)
4.8/5
(45)
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
(Multiple Choice)
4.8/5
(35)
Select below the technology that can be used to examine content through application-level filtering:
(Multiple Choice)
4.7/5
(26)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)