MATCHING
Match each item with a statement below:
a.IPS
f.proxy server
b.IDS
g.proxy service
c.content filtering
h.public key encryption
d.host-based
i.private key encryption
e.stateful
-Data is encrypted using two keys.
Correct Answer:
Verified
Q21: In _, both computers verify the credentials
Q31: MATCHING
Match each item with a statement below:
a.IPS
f.proxy
Q33: MATCHING
Match each item with a statement below:
a.IPS
f.proxy
Q33: Describe the three-way handshake used in CHAP.
Q34: MATCHING
Match each item with a statement below:
a.IPS
f.proxy
Q35: MATCHING
Match each item with a statement below:
a.IPS
f.proxy
Q35: In _, a hacker forges name server
Q37: MATCHING
Match each item with a statement below:
a.IPS
f.proxy
Q38: MATCHING
Match each item with a statement below:
a.IPS
f.proxy
Q39: _ protocols are the rules that computers
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents