Matching
Match each item with a statement below.
Premises:
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Can be used to combine the bandwidth of two network adapters
Computers with two network adapters
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Responses:
Link aggregation
Fault tolerance
Intrusion Detection System
Multi-homed
Hardening
Correct Answer:
Premises:
Responses:
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Can be used to combine the bandwidth of two network adapters
Computers with two network adapters
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Premises:
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Can be used to combine the bandwidth of two network adapters
Computers with two network adapters
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Responses:
Related Questions
Q5: Just running a RAID Level 5 system
Q6: A _ is an entryway into a
Q12: Hard drives that can be removed and
Q14: Describe the types of doors and locks
Q15: Hand _ readers are biometric devices used
Q16: Iris scanners are more invasive than retinal
Q23: Inexpensive video cameras may be used for
Q24: _ involves the process of identifying a
Q26: What are biometric devices?
Q28: Wireless networks can be found easily while