Deck 11: Network Security

ملء الشاشة (f)
exit full mode
سؤال
Network security is more often compromised "from the inside" than from external sources.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The use of certificate authorities to associate public keys with certain users is known as ____.

A) PGP
B) PKI
C) IPSec
D) SSL
سؤال
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can't respond to any of them.

A) flashing
B) denial-of-service
C) war driving
D) phishing
سؤال
Encryption is the last means of defense against data theft.
سؤال
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.

A) PGP
B) SSH
C) IPSec
D) SSL
سؤال
In a ____ attack, a person redirects or captures secure transmissions as they occur.

A) denial-of service
B) man-in-the-middle
C) war driving
D) phishing
سؤال
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
سؤال
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

A) packet-filtering
B) gateway
C) proxy
D) selective
سؤال
A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

A) digital certificate
B) authentication file
C) access control list
D) authentication certificate
سؤال
The combination of a public key and a private key is known as a ____.

A) key lock
B) key frame
C) key pair
D) key set
سؤال
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.

A) people
B) transmission and hardware
C) protocols and software
D) Internet access
سؤال
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

A) flashing
B) denial-of-service
C) dictionary
D) brute force
سؤال
A NOS that contains a "back door"is an example of a risk associated with ____.

A) people
B) transmission and hardware
C) protocols and software
D) Internet access
سؤال
By default, the 802.11 standard offers substantial security.
سؤال
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

A) Cracking
B) Hacking
C) War driving
D) Phishing
سؤال
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
سؤال
A ____ attack occurs when an Internet chat user sends commands to a victim's machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

A) flashing
B) denial-of-service
C) war driving
D) phishing
سؤال
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

A) flashing
B) denial-of-service
C) dictionary
D) brute force
سؤال
____ software searches a node for open ports.

A) Phishing
B) Sniffing
C) Authentication
D) Port scanner
سؤال
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

A) switch's
B) gateway's
C) router's
D) proxy server's
سؤال
In ____, both computers verify the credentials of the other.

A) mutual authorization
B) mutual access
C) mutual authentication
D) mutual verification
سؤال
Define SSH (secure shell) and explain the threats it guards against. Include an explanation of the encryption algorithms that may be used with it.
سؤال
RADIUS and TACACS belong to a category of protocols known as AAA (____).

A) access, authorization, and accounting
B) authentication, authorization, and accounting
C) authentication, authorization, and authority
D) authentication, authorization, and access
سؤال
____ is a method of encrypting TCP/IP transmissions above the network layer.

A) PGP
B) IPSec
C) PAP
D) SSL
سؤال
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
سؤال
Describe who should conduct a security audit and the advantages of doing so, if any.
سؤال
Describe one potential flaw in CHAP and MS-CHAP authentication and explain how it is resolved.
سؤال
A(n) ____________________ identifies an organization's security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
سؤال
Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
سؤال
Describe the SCP (Secure CoPy) utility.
سؤال
Describe the two phases IPSec use to accomplish authentication.
سؤال
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
سؤال
Describe the three-way handshake used in CHAP.
سؤال
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.

A) router
B) service
C) concentrator
D) certificate authority
سؤال
In ____, a hacker forges name server records to falsify his host's identity.

A) IP spoofing
B) DNS spoofing
C) ID spoofing
D) DHCP spoofing
سؤال
A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
سؤال
In general, information is ____________________ if it could be used by other parties to impair an organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.
سؤال
Define and describe PAP.
سؤال
____ protocols are the rules that computers follow to accomplish authentication.

A) Access
B) Availability
C) Authority
D) Authentication
سؤال
Describe what distinguishes 802.1x from other authentication standards.
سؤال
Describe an advantage of using EAP.
سؤال
Match between columns
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Stateful
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
proxy service
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
IDS
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
HIDS
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
public key encryption
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
content filtering
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
IPS
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
private key encryption
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
proxy server
Data is encrypted using a single key.
Stateful
Data is encrypted using a single key.
proxy service
Data is encrypted using a single key.
IDS
Data is encrypted using a single key.
HIDS
Data is encrypted using a single key.
public key encryption
Data is encrypted using a single key.
content filtering
Data is encrypted using a single key.
IPS
Data is encrypted using a single key.
private key encryption
Data is encrypted using a single key.
proxy server
Software that can only detect and log suspicious activity.
Stateful
Software that can only detect and log suspicious activity.
proxy service
Software that can only detect and log suspicious activity.
IDS
Software that can only detect and log suspicious activity.
HIDS
Software that can only detect and log suspicious activity.
public key encryption
Software that can only detect and log suspicious activity.
content filtering
Software that can only detect and log suspicious activity.
IPS
Software that can only detect and log suspicious activity.
private key encryption
Software that can only detect and log suspicious activity.
proxy server
A firewall that protects only the computer on which it is installed.
Stateful
A firewall that protects only the computer on which it is installed.
proxy service
A firewall that protects only the computer on which it is installed.
IDS
A firewall that protects only the computer on which it is installed.
HIDS
A firewall that protects only the computer on which it is installed.
public key encryption
A firewall that protects only the computer on which it is installed.
content filtering
A firewall that protects only the computer on which it is installed.
IPS
A firewall that protects only the computer on which it is installed.
private key encryption
A firewall that protects only the computer on which it is installed.
proxy server
The host that runs the proxy service.
Stateful
The host that runs the proxy service.
proxy service
The host that runs the proxy service.
IDS
The host that runs the proxy service.
HIDS
The host that runs the proxy service.
public key encryption
The host that runs the proxy service.
content filtering
The host that runs the proxy service.
IPS
The host that runs the proxy service.
private key encryption
The host that runs the proxy service.
proxy server
A firewall that can block designated types of traffic based on application data contained within packets.
Stateful
A firewall that can block designated types of traffic based on application data contained within packets.
proxy service
A firewall that can block designated types of traffic based on application data contained within packets.
IDS
A firewall that can block designated types of traffic based on application data contained within packets.
HIDS
A firewall that can block designated types of traffic based on application data contained within packets.
public key encryption
A firewall that can block designated types of traffic based on application data contained within packets.
content filtering
A firewall that can block designated types of traffic based on application data contained within packets.
IPS
A firewall that can block designated types of traffic based on application data contained within packets.
private key encryption
A firewall that can block designated types of traffic based on application data contained within packets.
proxy server
Data is encrypted using two keys.
Stateful
Data is encrypted using two keys.
proxy service
Data is encrypted using two keys.
IDS
Data is encrypted using two keys.
HIDS
Data is encrypted using two keys.
public key encryption
Data is encrypted using two keys.
content filtering
Data is encrypted using two keys.
IPS
Data is encrypted using two keys.
private key encryption
Data is encrypted using two keys.
proxy server
Software that can react to suspicious activity.
Stateful
Software that can react to suspicious activity.
proxy service
Software that can react to suspicious activity.
IDS
Software that can react to suspicious activity.
HIDS
Software that can react to suspicious activity.
public key encryption
Software that can react to suspicious activity.
content filtering
Software that can react to suspicious activity.
IPS
Software that can react to suspicious activity.
private key encryption
Software that can react to suspicious activity.
proxy server
A firewall that can view a data stream.
Stateful
A firewall that can view a data stream.
proxy service
A firewall that can view a data stream.
IDS
A firewall that can view a data stream.
HIDS
A firewall that can view a data stream.
public key encryption
A firewall that can view a data stream.
content filtering
A firewall that can view a data stream.
IPS
A firewall that can view a data stream.
private key encryption
A firewall that can view a data stream.
proxy server
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Network Security
1
Network security is more often compromised "from the inside" than from external sources.
True
2
The use of certificate authorities to associate public keys with certain users is known as ____.

A) PGP
B) PKI
C) IPSec
D) SSL
B
3
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can't respond to any of them.

A) flashing
B) denial-of-service
C) war driving
D) phishing
B
4
Encryption is the last means of defense against data theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.

A) PGP
B) SSH
C) IPSec
D) SSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
In a ____ attack, a person redirects or captures secure transmissions as they occur.

A) denial-of service
B) man-in-the-middle
C) war driving
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

A) packet-filtering
B) gateway
C) proxy
D) selective
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

A) digital certificate
B) authentication file
C) access control list
D) authentication certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The combination of a public key and a private key is known as a ____.

A) key lock
B) key frame
C) key pair
D) key set
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.

A) people
B) transmission and hardware
C) protocols and software
D) Internet access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

A) flashing
B) denial-of-service
C) dictionary
D) brute force
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
A NOS that contains a "back door"is an example of a risk associated with ____.

A) people
B) transmission and hardware
C) protocols and software
D) Internet access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
By default, the 802.11 standard offers substantial security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

A) Cracking
B) Hacking
C) War driving
D) Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
A ____ attack occurs when an Internet chat user sends commands to a victim's machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

A) flashing
B) denial-of-service
C) war driving
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

A) flashing
B) denial-of-service
C) dictionary
D) brute force
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ software searches a node for open ports.

A) Phishing
B) Sniffing
C) Authentication
D) Port scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

A) switch's
B) gateway's
C) router's
D) proxy server's
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
In ____, both computers verify the credentials of the other.

A) mutual authorization
B) mutual access
C) mutual authentication
D) mutual verification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Define SSH (secure shell) and explain the threats it guards against. Include an explanation of the encryption algorithms that may be used with it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
RADIUS and TACACS belong to a category of protocols known as AAA (____).

A) access, authorization, and accounting
B) authentication, authorization, and accounting
C) authentication, authorization, and authority
D) authentication, authorization, and access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
____ is a method of encrypting TCP/IP transmissions above the network layer.

A) PGP
B) IPSec
C) PAP
D) SSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe who should conduct a security audit and the advantages of doing so, if any.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Describe one potential flaw in CHAP and MS-CHAP authentication and explain how it is resolved.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n) ____________________ identifies an organization's security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe the SCP (Secure CoPy) utility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe the two phases IPSec use to accomplish authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Describe the three-way handshake used in CHAP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.

A) router
B) service
C) concentrator
D) certificate authority
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
In ____, a hacker forges name server records to falsify his host's identity.

A) IP spoofing
B) DNS spoofing
C) ID spoofing
D) DHCP spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
In general, information is ____________________ if it could be used by other parties to impair an organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Define and describe PAP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
____ protocols are the rules that computers follow to accomplish authentication.

A) Access
B) Availability
C) Authority
D) Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe what distinguishes 802.1x from other authentication standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe an advantage of using EAP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Stateful
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
proxy service
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
IDS
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
HIDS
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
public key encryption
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
content filtering
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
IPS
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
private key encryption
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
proxy server
Data is encrypted using a single key.
Stateful
Data is encrypted using a single key.
proxy service
Data is encrypted using a single key.
IDS
Data is encrypted using a single key.
HIDS
Data is encrypted using a single key.
public key encryption
Data is encrypted using a single key.
content filtering
Data is encrypted using a single key.
IPS
Data is encrypted using a single key.
private key encryption
Data is encrypted using a single key.
proxy server
Software that can only detect and log suspicious activity.
Stateful
Software that can only detect and log suspicious activity.
proxy service
Software that can only detect and log suspicious activity.
IDS
Software that can only detect and log suspicious activity.
HIDS
Software that can only detect and log suspicious activity.
public key encryption
Software that can only detect and log suspicious activity.
content filtering
Software that can only detect and log suspicious activity.
IPS
Software that can only detect and log suspicious activity.
private key encryption
Software that can only detect and log suspicious activity.
proxy server
A firewall that protects only the computer on which it is installed.
Stateful
A firewall that protects only the computer on which it is installed.
proxy service
A firewall that protects only the computer on which it is installed.
IDS
A firewall that protects only the computer on which it is installed.
HIDS
A firewall that protects only the computer on which it is installed.
public key encryption
A firewall that protects only the computer on which it is installed.
content filtering
A firewall that protects only the computer on which it is installed.
IPS
A firewall that protects only the computer on which it is installed.
private key encryption
A firewall that protects only the computer on which it is installed.
proxy server
The host that runs the proxy service.
Stateful
The host that runs the proxy service.
proxy service
The host that runs the proxy service.
IDS
The host that runs the proxy service.
HIDS
The host that runs the proxy service.
public key encryption
The host that runs the proxy service.
content filtering
The host that runs the proxy service.
IPS
The host that runs the proxy service.
private key encryption
The host that runs the proxy service.
proxy server
A firewall that can block designated types of traffic based on application data contained within packets.
Stateful
A firewall that can block designated types of traffic based on application data contained within packets.
proxy service
A firewall that can block designated types of traffic based on application data contained within packets.
IDS
A firewall that can block designated types of traffic based on application data contained within packets.
HIDS
A firewall that can block designated types of traffic based on application data contained within packets.
public key encryption
A firewall that can block designated types of traffic based on application data contained within packets.
content filtering
A firewall that can block designated types of traffic based on application data contained within packets.
IPS
A firewall that can block designated types of traffic based on application data contained within packets.
private key encryption
A firewall that can block designated types of traffic based on application data contained within packets.
proxy server
Data is encrypted using two keys.
Stateful
Data is encrypted using two keys.
proxy service
Data is encrypted using two keys.
IDS
Data is encrypted using two keys.
HIDS
Data is encrypted using two keys.
public key encryption
Data is encrypted using two keys.
content filtering
Data is encrypted using two keys.
IPS
Data is encrypted using two keys.
private key encryption
Data is encrypted using two keys.
proxy server
Software that can react to suspicious activity.
Stateful
Software that can react to suspicious activity.
proxy service
Software that can react to suspicious activity.
IDS
Software that can react to suspicious activity.
HIDS
Software that can react to suspicious activity.
public key encryption
Software that can react to suspicious activity.
content filtering
Software that can react to suspicious activity.
IPS
Software that can react to suspicious activity.
private key encryption
Software that can react to suspicious activity.
proxy server
A firewall that can view a data stream.
Stateful
A firewall that can view a data stream.
proxy service
A firewall that can view a data stream.
IDS
A firewall that can view a data stream.
HIDS
A firewall that can view a data stream.
public key encryption
A firewall that can view a data stream.
content filtering
A firewall that can view a data stream.
IPS
A firewall that can view a data stream.
private key encryption
A firewall that can view a data stream.
proxy server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.