Matching
Match each item with a statement below:
Premises:
a security device that can detect a hacker's attempts to gain access to the network
these viruses change their appearance each time they replicate or infect
type of malware that appears to perform a desired function but in fact performs malicious functions
the primary method of keeping hackers out of a network
a single-key encryption method
an organization's set of rules regarding how to handle and protect sensitive data
uses a mathematically matched key pair
the first level of security in any network
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Responses:
IDS
Firewall
Physical security
Security policy
Polymorphic virus
Asymmetric key encryption
Worm
Symmetric key encryption
Trojan Horse
Correct Answer:
Premises:
Responses:
a security device that can detect a hacker's attempts to gain access to the network
these viruses change their appearance each time they replicate or infect
type of malware that appears to perform a desired function but in fact performs malicious functions
the primary method of keeping hackers out of a network
a single-key encryption method
an organization's set of rules regarding how to handle and protect sensitive data
uses a mathematically matched key pair
the first level of security in any network
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Premises:
a security device that can detect a hacker's attempts to gain access to the network
these viruses change their appearance each time they replicate or infect
type of malware that appears to perform a desired function but in fact performs malicious functions
the primary method of keeping hackers out of a network
a single-key encryption method
an organization's set of rules regarding how to handle and protect sensitive data
uses a mathematically matched key pair
the first level of security in any network
once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
Responses:
Related Questions
Q32: _ is a suite of protocols, accepted
Q33: Briefly explain encryption at the network level.
Q34: A _ VPN allows multiple corporate sites
Q35: A(n) _ is like an IDS, except
Q36: In network security, a(n) _ is an
Q37: A(n) _ is a server running a
Q38: What are some of the items that
Q39: _ is the process by which users
Q40: What are some unnecessary services on most
Q42: Describe the two IPSec protocols that have
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents