Course Hero Logo
Question
Answered step-by-step

 Question 1 What does a digital signature provide?   A....

 Question 1
What does a digital signature provide?
 

A.Confidentiality
B.Integrity
C.Authorization
D.Nonrepudiation


 Question 2
Protecting computers, hard disks, databases, and other computer equipment from unauthorized
Internet access can be categorized as what kind of security area?
 

A.Application security
B.Transaction security
C.Network security
D.Hardware security


 Question 3
Werner is a security manager for a health insurance company. He is examining the
organization's compliance with patient privacy. While investigating how staff handle verbal and
email communications, he discovers that some staff members are lax about how well they
protect details that, when combined, might be used to reveal sensitive details about some
customers. What is the focus of his concern?
 

A.Personally identifiable information (PII)
B.Integrity
C.Authentication
D.Domain Name System (DNS)

Question 4
Which of the following is closely associated with maintaining data integrity?
 

A.Nonrepudiation
B.Redundancy
C.Encryption
D.Hash


 Question 5
Brianna is an IT technician. She is studying a threat that holds the communication channel open
when a TCP handshake does not conclude. What kind of attack does this involve?
 

A.Denial of service (DoS) attack
B.The interception of transaction data
C.Unauthorized persons breaching a server's document tree
D.Hackers accessing information on a server

 Question 6
Tonya is redesigning her company's network infrastructure to accommodate rapid growth.
Several departments are highly specialized. Tonya needs to allow Network News Transfer
Protocol (NNTP) on some, but not all, subnets. Her budget is limited. Which of the following is the best solution?

A.Configure existing routers to filter NNTP packets.
B.Install firewalls at each network segment with rules to filter specific traffic for each one as
required.
C.Install firewalls at the demilitarized zone (DMZ) to filter packets by protocol, port, and
destination subnet, and then perform port forwarding.
D.Configure the native firewall on each workstation to filter traffic based on the
requirements for the subnet they're on


 Question 7
Demetrice is a network consultant. She has been hired to design security for a network that
hosts 25 employees, many of whom need remote access. The client recently opened another
small office in a neighboring community and wants to be able to routinely establish secure
network connections between the two locations. The client often deals with customer bank
information and requires a particularly secure solution. What is her response to these
requirements?
 

A.Intrusion detection system/intrusion prevention system (IDS/IPS) with Remote Desktop
Connection support
B.Web proxy with content filtering and network address translation (NAT) mapping
C.Snort intrusion detection system (IDS)
D.Small office/home office (SOHO) virtual private network (VPN)


 

Answer & Explanation
Verified Solved by verified expert

sum
usce
ec f
ipsu
itur
a mo
o. D

gue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor n

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer
Step-by-step explanation

ongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vi

gue

lestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipis

gue

Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus

gue

or nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consect

gue

Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultric

gue

et, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam ri

gue

trices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices a

gue

gue