Matching
Match each item with a statement below:
Premises:
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Data is encrypted using a single key.
Software that can only detect and log suspicious activity.
A firewall that protects only the computer on which it is installed.
The host that runs the proxy service.
A firewall that can block designated types of traffic based on application data contained within packets.
Data is encrypted using two keys.
Software that can react to suspicious activity.
A firewall that can view a data stream.
Responses:
Stateful
HIDS
proxy server
IPS
public key encryption
private key encryption
IDS
content filtering
proxy service
Correct Answer:
Premises:
Responses:
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Data is encrypted using a single key.
Software that can only detect and log suspicious activity.
A firewall that protects only the computer on which it is installed.
The host that runs the proxy service.
A firewall that can block designated types of traffic based on application data contained within packets.
Data is encrypted using two keys.
Software that can react to suspicious activity.
A firewall that can view a data stream.
Premises:
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Data is encrypted using a single key.
Software that can only detect and log suspicious activity.
A firewall that protects only the computer on which it is installed.
The host that runs the proxy service.
A firewall that can block designated types of traffic based on application data contained within packets.
Data is encrypted using two keys.
Software that can react to suspicious activity.
A firewall that can view a data stream.
Responses:
Related Questions
Q32: A(n) _ is a software application on
Q33: Describe the three-way handshake used in CHAP.
Q34: A VPN _ authenticates VPN clients and
Q35: In _, a hacker forges name server
Q36: A(n) _ is a thorough examination of
Q37: In general, information is _ if it
Q38: Define and describe PAP.
Q39: _ protocols are the rules that computers
Q40: Describe what distinguishes 802.1x from other authentication
Q41: Describe an advantage of using EAP.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents