Multiple Choice
Match each term with the correct statement below.
-used between network computers to verify the authenticity of the communication.
A) worm
B) demilitarized zone
C) National Security Institute (NSI)
D) remote denial of service (DoS) attack
E) sniffer software
F) digital certificate
G) access control list (ACL)
H) IPTables
I) spyware
Correct Answer:

Verified
Correct Answer:
Verified
Q26: Which of the following is used to
Q27: A border _ is a firewall that
Q28: Identify four tasks that can be fulfilled
Q29: A(n)_ is information that a Web server
Q30: A DoS attack that floods a host
Q32: A(n)_ is a computer that is located
Q33: Provide a general description for how routers
Q34: Match each term with the correct statement
Q35: How does a buffer attack work?
Q36: What are the advantages of using Network