Matching
Match each item with a statement below.
Premises:
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Can be used to combine the bandwidth of two network adapters
Computers with two network adapters
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Responses:
Link aggregation
Fault tolerance
Intrusion Detection System
Multi-homed
Hardening
Correct Answer:
Premises:
Responses:
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Can be used to combine the bandwidth of two network adapters
Computers with two network adapters
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Premises:
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Can be used to combine the bandwidth of two network adapters
Computers with two network adapters
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Responses:
Related Questions
Q2: Bandwidth _ is where anyone with a
Q6: Hand _ readers are biometric devices used
Q16: Hard drives that can be removed and
Q18: While nothing can prevent a lost connection
Q19: _ scanning uses patterns in the blood
Q21: Describe an Intrusion Detection System.
Q27: Describe the types of doors and locks
Q29: Discuss handwriting authentication.
Q30: Describe a physical security plan.
Q78: What are biometric devices?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents