Deck 14: Network Security

ملء الشاشة (f)
exit full mode
سؤال
____ is an industry-standard protocol that simply provides authentication service.

A) TACACS+
B) SSL
C) RADIUS
D) TLS
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ____ protocol is governed by RFC 2865 and can be used with cross-platform integration.

A) RADIUS
B) TACACS+
C) SSL
D) CHAP
سؤال
A computer program that can infect a computer without the knowledge or permission of the user is a(n)____.

A) Worm
B) Macro Virus
C) Logic bomb
D) Virus
سؤال
The ____ firewall topology consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host.

A) packet-filtering router
B) demilitarized zone
C) single-homed bastion
D) dual-homed bastion
سؤال
The Cisco ____ service will examine your router and recommend which services should be disabled.

A) CHAP
B) RADIUS
C) SSH
D) SDM
سؤال
A ____ virus is a virus that infects a computer's master boot record.

A) stealth
B) boot-sector
C) polymorphic
D) logic bomb
سؤال
When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.

A) macro virus
B) worm
C) Trojan
D) logic bomb
سؤال
A ____ is a piece of code inserted into a program that will perform specific malicious functions when specified conditions are met.

A) logic bomb
B) Trojan Horse
C) macro virus
D) worm
سؤال
____ is a means of encrypting a session between two hosts through the use of digital certificates, which are based on asymmetric key encryption.

A) CHAP
B) RADIUS
C) DMZ
D) SSL
سؤال
The virus prevention industry is a proactive industry.
سؤال
The ____ is the most secure firewall solution.

A) dual-homed bastion
B) DMZ
C) packet-filtering router
D) single-homed bastion
سؤال
A ____ virus is so named because it attempts to hide itself from detection.

A) logic bomb
B) polymorphic
C) stealth
D) boot-sector
سؤال
A ____ topology works like a single-homed bastion topology, except that it has two network adapter cards in it and two IP addresses, one for each network it is connected to.

A) demilitarized zone
B) single-router zone
C) packet-filtering router
D) dual-homed bastion
سؤال
A single-homed bastion has two network interface cards and is assigned two IP addresses.
سؤال
____ are a popular technology for creating a connection between an external computer and a corporate site over the Internet.

A) Firewalls
B) DMZs
C) VPNs
D) Packet-filtering routers
سؤال
An effective security policy implements multiple layers of security.
سؤال
____ is a patch management software package.

A) Symantec's Altiris
B) Microsoft's CLI
C) Cisco's SWC
D) Cisco's SDM
سؤال
The ____ is the least protective of the four firewall topologies.

A) dual-homed bastion
B) packet-filtering router
C) single-homed bastion
D) demilitarized zone
سؤال
All devices in a RADIUS authentication stream have to be Cisco devices.
سؤال
After virus prevention software has been installed, it must be updated regularly to ensure your network is protected against all the latest malware threats.
سؤال
What are the goals of a security policy?
سؤال
Why is it important to have a patch management program?
سؤال
Briefly describe a Virtual Private Network (VPN)?
سؤال
A client-to-site VPN is also known as a ____ VPN.

A) remote user
B) client-to-server
C) site-to-site
D) client-to-client
سؤال
Briefly describe a client-to-site VPN.
سؤال
A(n) ____ is a configuration value (or simply stated, a command) that allows you to establish an IPSEC VPN on a Cisco firewall.

A) IKE set
B) transform set
C) AH script
D) SDM set
سؤال
A ____ VPN allows designated users to have access to the corporate network from remote locations.

A) site-to-site
B) client-to-site
C) user-to-user
D) user-to-server
سؤال
____ is a tunneling protocol that was developed by Microsoft and was extremely popular at one time for remote users who had to dial in to the corporate network on a secure channel.

A) GRE
B) L2TP
C) PPTP
D) IPSec
سؤال
Briefly explain how to protect an organization's hardware.
سؤال
Why is user training paramount in protecting against viruses?
سؤال
____________________ refers to malicious programs that have many different capabilities. Some might do something relatively harmless, such as opening files on a CD-ROM; others might be extremely destructive, perhaps destroying all of the data on a computer.
سؤال
____ is a suite of protocols, accepted as an industry standard, which provides secure data transmission over layer 3 of the OSI model.

A) L2TP
B) PPTP
C) GRE
D) IPSec
سؤال
Briefly explain encryption at the network level.
سؤال
A ____ VPN allows multiple corporate sites to be connected over low-cost Internet connections.

A) server-to-client
B) site-to-site
C) client-to-site
D) site-to-client
سؤال
A(n) ___________________________________ is like an IDS, except that it is placed in line so all packets coming in or going out of the network pass through it.
سؤال
In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.
سؤال
A(n) ____________________ is a server running a single application, such as a proxy server or specialized firewall software.
سؤال
What are some of the items that a security policy should include?
سؤال
____________________ is the process by which users verify to a server that they are who they say they are.
سؤال
What are some unnecessary services on most networks?
سؤال
Match between columns
a security device that can detect a hacker's attempts to gain access to the network
Polymorphic virus
a security device that can detect a hacker's attempts to gain access to the network
Security policy
a security device that can detect a hacker's attempts to gain access to the network
Symmetric key encryption
a security device that can detect a hacker's attempts to gain access to the network
Asymmetric key encryption
a security device that can detect a hacker's attempts to gain access to the network
Physical security
a security device that can detect a hacker's attempts to gain access to the network
IDS
a security device that can detect a hacker's attempts to gain access to the network
Trojan Horse
a security device that can detect a hacker's attempts to gain access to the network
Firewall
a security device that can detect a hacker's attempts to gain access to the network
Worm
these viruses change their appearance each time they replicate or infect
Polymorphic virus
these viruses change their appearance each time they replicate or infect
Security policy
these viruses change their appearance each time they replicate or infect
Symmetric key encryption
these viruses change their appearance each time they replicate or infect
Asymmetric key encryption
these viruses change their appearance each time they replicate or infect
Physical security
these viruses change their appearance each time they replicate or infect
IDS
these viruses change their appearance each time they replicate or infect
Trojan Horse
these viruses change their appearance each time they replicate or infect
Firewall
these viruses change their appearance each time they replicate or infect
Worm
type of malware that appears to perform a desired function but in fact performs malicious functions
Polymorphic virus
type of malware that appears to perform a desired function but in fact performs malicious functions
Security policy
type of malware that appears to perform a desired function but in fact performs malicious functions
Symmetric key encryption
type of malware that appears to perform a desired function but in fact performs malicious functions
Asymmetric key encryption
type of malware that appears to perform a desired function but in fact performs malicious functions
Physical security
type of malware that appears to perform a desired function but in fact performs malicious functions
IDS
type of malware that appears to perform a desired function but in fact performs malicious functions
Trojan Horse
type of malware that appears to perform a desired function but in fact performs malicious functions
Firewall
type of malware that appears to perform a desired function but in fact performs malicious functions
Worm
the primary method of keeping hackers out of a network
Polymorphic virus
the primary method of keeping hackers out of a network
Security policy
the primary method of keeping hackers out of a network
Symmetric key encryption
the primary method of keeping hackers out of a network
Asymmetric key encryption
the primary method of keeping hackers out of a network
Physical security
the primary method of keeping hackers out of a network
IDS
the primary method of keeping hackers out of a network
Trojan Horse
the primary method of keeping hackers out of a network
Firewall
the primary method of keeping hackers out of a network
Worm
a single-key encryption method
Polymorphic virus
a single-key encryption method
Security policy
a single-key encryption method
Symmetric key encryption
a single-key encryption method
Asymmetric key encryption
a single-key encryption method
Physical security
a single-key encryption method
IDS
a single-key encryption method
Trojan Horse
a single-key encryption method
Firewall
a single-key encryption method
Worm
an organization's set of rules regarding how to handle and protect sensitive data
Polymorphic virus
an organization's set of rules regarding how to handle and protect sensitive data
Security policy
an organization's set of rules regarding how to handle and protect sensitive data
Symmetric key encryption
an organization's set of rules regarding how to handle and protect sensitive data
Asymmetric key encryption
an organization's set of rules regarding how to handle and protect sensitive data
Physical security
an organization's set of rules regarding how to handle and protect sensitive data
IDS
an organization's set of rules regarding how to handle and protect sensitive data
Trojan Horse
an organization's set of rules regarding how to handle and protect sensitive data
Firewall
an organization's set of rules regarding how to handle and protect sensitive data
Worm
uses a mathematically matched key pair
Polymorphic virus
uses a mathematically matched key pair
Security policy
uses a mathematically matched key pair
Symmetric key encryption
uses a mathematically matched key pair
Asymmetric key encryption
uses a mathematically matched key pair
Physical security
uses a mathematically matched key pair
IDS
uses a mathematically matched key pair
Trojan Horse
uses a mathematically matched key pair
Firewall
uses a mathematically matched key pair
Worm
the first level of security in any network
Polymorphic virus
the first level of security in any network
Security policy
the first level of security in any network
Symmetric key encryption
the first level of security in any network
Asymmetric key encryption
the first level of security in any network
Physical security
the first level of security in any network
IDS
the first level of security in any network
Trojan Horse
the first level of security in any network
Firewall
the first level of security in any network
Worm
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Polymorphic virus
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Security policy
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Symmetric key encryption
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Asymmetric key encryption
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Physical security
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
IDS
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Trojan Horse
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Firewall
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Worm
سؤال
Describe the two IPSec protocols that have been developed to provide packet-level security.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Network Security
1
____ is an industry-standard protocol that simply provides authentication service.

A) TACACS+
B) SSL
C) RADIUS
D) TLS
C
2
The ____ protocol is governed by RFC 2865 and can be used with cross-platform integration.

A) RADIUS
B) TACACS+
C) SSL
D) CHAP
A
3
A computer program that can infect a computer without the knowledge or permission of the user is a(n)____.

A) Worm
B) Macro Virus
C) Logic bomb
D) Virus
D
4
The ____ firewall topology consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host.

A) packet-filtering router
B) demilitarized zone
C) single-homed bastion
D) dual-homed bastion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
The Cisco ____ service will examine your router and recommend which services should be disabled.

A) CHAP
B) RADIUS
C) SSH
D) SDM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ virus is a virus that infects a computer's master boot record.

A) stealth
B) boot-sector
C) polymorphic
D) logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.

A) macro virus
B) worm
C) Trojan
D) logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ____ is a piece of code inserted into a program that will perform specific malicious functions when specified conditions are met.

A) logic bomb
B) Trojan Horse
C) macro virus
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ is a means of encrypting a session between two hosts through the use of digital certificates, which are based on asymmetric key encryption.

A) CHAP
B) RADIUS
C) DMZ
D) SSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The virus prevention industry is a proactive industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ____ is the most secure firewall solution.

A) dual-homed bastion
B) DMZ
C) packet-filtering router
D) single-homed bastion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
A ____ virus is so named because it attempts to hide itself from detection.

A) logic bomb
B) polymorphic
C) stealth
D) boot-sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ____ topology works like a single-homed bastion topology, except that it has two network adapter cards in it and two IP addresses, one for each network it is connected to.

A) demilitarized zone
B) single-router zone
C) packet-filtering router
D) dual-homed bastion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
A single-homed bastion has two network interface cards and is assigned two IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ are a popular technology for creating a connection between an external computer and a corporate site over the Internet.

A) Firewalls
B) DMZs
C) VPNs
D) Packet-filtering routers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
An effective security policy implements multiple layers of security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ is a patch management software package.

A) Symantec's Altiris
B) Microsoft's CLI
C) Cisco's SWC
D) Cisco's SDM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ____ is the least protective of the four firewall topologies.

A) dual-homed bastion
B) packet-filtering router
C) single-homed bastion
D) demilitarized zone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
All devices in a RADIUS authentication stream have to be Cisco devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
After virus prevention software has been installed, it must be updated regularly to ensure your network is protected against all the latest malware threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
What are the goals of a security policy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Why is it important to have a patch management program?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Briefly describe a Virtual Private Network (VPN)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
A client-to-site VPN is also known as a ____ VPN.

A) remote user
B) client-to-server
C) site-to-site
D) client-to-client
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Briefly describe a client-to-site VPN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
A(n) ____ is a configuration value (or simply stated, a command) that allows you to establish an IPSEC VPN on a Cisco firewall.

A) IKE set
B) transform set
C) AH script
D) SDM set
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
A ____ VPN allows designated users to have access to the corporate network from remote locations.

A) site-to-site
B) client-to-site
C) user-to-user
D) user-to-server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
____ is a tunneling protocol that was developed by Microsoft and was extremely popular at one time for remote users who had to dial in to the corporate network on a secure channel.

A) GRE
B) L2TP
C) PPTP
D) IPSec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Briefly explain how to protect an organization's hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Why is user training paramount in protecting against viruses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
____________________ refers to malicious programs that have many different capabilities. Some might do something relatively harmless, such as opening files on a CD-ROM; others might be extremely destructive, perhaps destroying all of the data on a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
____ is a suite of protocols, accepted as an industry standard, which provides secure data transmission over layer 3 of the OSI model.

A) L2TP
B) PPTP
C) GRE
D) IPSec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Briefly explain encryption at the network level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
A ____ VPN allows multiple corporate sites to be connected over low-cost Internet connections.

A) server-to-client
B) site-to-site
C) client-to-site
D) site-to-client
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n) ___________________________________ is like an IDS, except that it is placed in line so all packets coming in or going out of the network pass through it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
In network security, a(n) ____________________ is an official approval that allows a user to access a specific network resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
A(n) ____________________ is a server running a single application, such as a proxy server or specialized firewall software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are some of the items that a security policy should include?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
____________________ is the process by which users verify to a server that they are who they say they are.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are some unnecessary services on most networks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
a security device that can detect a hacker's attempts to gain access to the network
Polymorphic virus
a security device that can detect a hacker's attempts to gain access to the network
Security policy
a security device that can detect a hacker's attempts to gain access to the network
Symmetric key encryption
a security device that can detect a hacker's attempts to gain access to the network
Asymmetric key encryption
a security device that can detect a hacker's attempts to gain access to the network
Physical security
a security device that can detect a hacker's attempts to gain access to the network
IDS
a security device that can detect a hacker's attempts to gain access to the network
Trojan Horse
a security device that can detect a hacker's attempts to gain access to the network
Firewall
a security device that can detect a hacker's attempts to gain access to the network
Worm
these viruses change their appearance each time they replicate or infect
Polymorphic virus
these viruses change their appearance each time they replicate or infect
Security policy
these viruses change their appearance each time they replicate or infect
Symmetric key encryption
these viruses change their appearance each time they replicate or infect
Asymmetric key encryption
these viruses change their appearance each time they replicate or infect
Physical security
these viruses change their appearance each time they replicate or infect
IDS
these viruses change their appearance each time they replicate or infect
Trojan Horse
these viruses change their appearance each time they replicate or infect
Firewall
these viruses change their appearance each time they replicate or infect
Worm
type of malware that appears to perform a desired function but in fact performs malicious functions
Polymorphic virus
type of malware that appears to perform a desired function but in fact performs malicious functions
Security policy
type of malware that appears to perform a desired function but in fact performs malicious functions
Symmetric key encryption
type of malware that appears to perform a desired function but in fact performs malicious functions
Asymmetric key encryption
type of malware that appears to perform a desired function but in fact performs malicious functions
Physical security
type of malware that appears to perform a desired function but in fact performs malicious functions
IDS
type of malware that appears to perform a desired function but in fact performs malicious functions
Trojan Horse
type of malware that appears to perform a desired function but in fact performs malicious functions
Firewall
type of malware that appears to perform a desired function but in fact performs malicious functions
Worm
the primary method of keeping hackers out of a network
Polymorphic virus
the primary method of keeping hackers out of a network
Security policy
the primary method of keeping hackers out of a network
Symmetric key encryption
the primary method of keeping hackers out of a network
Asymmetric key encryption
the primary method of keeping hackers out of a network
Physical security
the primary method of keeping hackers out of a network
IDS
the primary method of keeping hackers out of a network
Trojan Horse
the primary method of keeping hackers out of a network
Firewall
the primary method of keeping hackers out of a network
Worm
a single-key encryption method
Polymorphic virus
a single-key encryption method
Security policy
a single-key encryption method
Symmetric key encryption
a single-key encryption method
Asymmetric key encryption
a single-key encryption method
Physical security
a single-key encryption method
IDS
a single-key encryption method
Trojan Horse
a single-key encryption method
Firewall
a single-key encryption method
Worm
an organization's set of rules regarding how to handle and protect sensitive data
Polymorphic virus
an organization's set of rules regarding how to handle and protect sensitive data
Security policy
an organization's set of rules regarding how to handle and protect sensitive data
Symmetric key encryption
an organization's set of rules regarding how to handle and protect sensitive data
Asymmetric key encryption
an organization's set of rules regarding how to handle and protect sensitive data
Physical security
an organization's set of rules regarding how to handle and protect sensitive data
IDS
an organization's set of rules regarding how to handle and protect sensitive data
Trojan Horse
an organization's set of rules regarding how to handle and protect sensitive data
Firewall
an organization's set of rules regarding how to handle and protect sensitive data
Worm
uses a mathematically matched key pair
Polymorphic virus
uses a mathematically matched key pair
Security policy
uses a mathematically matched key pair
Symmetric key encryption
uses a mathematically matched key pair
Asymmetric key encryption
uses a mathematically matched key pair
Physical security
uses a mathematically matched key pair
IDS
uses a mathematically matched key pair
Trojan Horse
uses a mathematically matched key pair
Firewall
uses a mathematically matched key pair
Worm
the first level of security in any network
Polymorphic virus
the first level of security in any network
Security policy
the first level of security in any network
Symmetric key encryption
the first level of security in any network
Asymmetric key encryption
the first level of security in any network
Physical security
the first level of security in any network
IDS
the first level of security in any network
Trojan Horse
the first level of security in any network
Firewall
the first level of security in any network
Worm
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Polymorphic virus
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Security policy
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Symmetric key encryption
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Asymmetric key encryption
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Physical security
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
IDS
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Trojan Horse
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Firewall
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe the two IPSec protocols that have been developed to provide packet-level security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.