Homework Help This preview shows page 4 - 7 out of 20 pages. 16. Which term refers to an aspect of any program that sends information about your system or youractions over the Internet?A. SpywareB. AdwareC. MacroD. Trojan Horse 17. Which type of attack is a form of social engineering? Get answer to your question and much more 18. What series of standards does the U.S National Security Agency (NSA) define to block RF emanation? Get answer to your question and much more 19. Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or othermore exotic characteristics are all examples of __________. Get answer to your question and much more 20. Biometric access calls for using a(n) __________ physical characteristic of a person to permit accessto a controlled IT resource.A. sharedB. publicC. uniqueD. common We have textbook solutions for you!The document you are viewing contains questions related to this textbook. A+ Guide to Software Andrews/Dark Expert Verified21. IP cameras and __________ are specific implementations of video monitoring. Get answer to your question and much more 22. Cisco uses what it calls __________ as one of its tools to implement network admission control. Get answer to your question and much more 23. What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer? Get answer to your question and much more 24. Your first and last bastion of defense for your entire infrastructure’s security is at the individual__________.A. NICsB. portsC. hostsD. user accounts 25. Which term refers to a system with very high network output? Get answer to your question and much more 26. What are the most common symptoms of malware on a compromised system? Get answer to your question and much more 27. Which type of firewall is built into most consumer-grade routers? Get answer to your question and much more 28. Which type of firewall packet inspection is aware is aware of the packet’s state, as it relates to otherpackets?A. StatefulB. StatelessC. PortD. Filtered 29. Which type of firewall packet inspection inspects each packet fresh, with no regard to the state of thepacket’s relation to any other packet? Get answer to your question and much more Upload your study docs or become a Course Hero member to access this document Upload your study docs or become a Course Hero member to access this document End of preview. Want to read all 20 pages? Upload your study docs or become a Course Hero member to access this document Tags IP address, Transmission Control Protocol, Simple Network Management Protocol, Packet analyzer We have textbook solutions for you!The document you are viewing contains questions related to this textbook. The document you are viewing contains questions related to this textbook. A+ Guide to Software Andrews/Dark Expert Verified What series of standards does the US National Security Agency NSA define to block RF emanation?TEMPEST is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.
Which type of firewall packet inspection is aware of the packet's state as it relates to other packets?Stateful inspection is the kind of network firewall technology that filters data packets supported by state and context.
Which technology consists of devices or software that protect an internal network from unauthorized access by acting as a filter?Firewall defined
A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.
Which term refers to a function of any program that sends information about your system or your actions over the Internet?Spyware. A function of any program that sends information about your system or your actions over the Internet.
|