Matching
Match each item with a statement below:
Premises:
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Data is encrypted using a single key.
Software that can only detect and log suspicious activity.
A firewall that protects only the computer on which it is installed.
The host that runs the proxy service.
A firewall that can block designated types of traffic based on application data contained within packets.
Data is encrypted using two keys.
Software that can react to suspicious activity.
A firewall that can view a data stream.
Responses:
Stateful
HIDS
proxy server
IPS
public key encryption
private key encryption
IDS
content filtering
proxy service
Correct Answer:
Premises:
Responses:
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Data is encrypted using a single key.
Software that can only detect and log suspicious activity.
A firewall that protects only the computer on which it is installed.
The host that runs the proxy service.
A firewall that can block designated types of traffic based on application data contained within packets.
Data is encrypted using two keys.
Software that can react to suspicious activity.
A firewall that can view a data stream.
Premises:
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Data is encrypted using a single key.
Software that can only detect and log suspicious activity.
A firewall that protects only the computer on which it is installed.
The host that runs the proxy service.
A firewall that can block designated types of traffic based on application data contained within packets.
Data is encrypted using two keys.
Software that can react to suspicious activity.
A firewall that can view a data stream.
Responses:
Related Questions
Q6: Describe an advantage of using EAP.
Q7: Describe the two phases IPSec use to
Q8: Describe what distinguishes 802.1x from other authentication
Q9: The combination of a public key and
Q10: Define SSH (secure shell) and explain the
Q12: Describe one potential flaw in CHAP and
Q13: In _, a hacker forges name server
Q14: Describe the three-way handshake used in CHAP.
Q15: _ is the use of an algorithm
Q16: _ is a social engineering practice in