Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network+ Guide to Networks Study Set 1
Quiz 12: Network Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -Software that can react to suspicious activity.
Question 22
Short Answer
In general,information is ____________________ if it could be used by other parties to impair an organization's functioning,decrease customers' confidence,cause a financial loss,damage an organization's status,or give a significant advantage to a competitor.
Question 23
Short Answer
A(n)____________________ identifies an organization's security risks,levels of authority,designated security coordinator and team members,responsibilities for each team member,and responsibilities for each employee.
Question 24
Multiple Choice
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
Question 25
Short Answer
A(n)____________________ is a software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.
Question 26
Short Answer
MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -Software that can only detect and log suspicious activity.