Asked by PrivateFangAlpaca10
Question 1 What does a digital signature provide? A....
Question 1
What does a digital signature provide?
A. | Confidentiality |
B. | Integrity |
C. | Authorization |
D. | Nonrepudiation |
Question 2
Protecting computers, hard disks, databases, and other computer equipment from unauthorized
Internet access can be categorized as what kind of security area?
A. | Application security |
B. | Transaction security |
C. | Network security |
D. | Hardware security |
Question 3
Werner is a security manager for a health insurance company. He is examining the
organization's compliance with patient privacy. While investigating how staff handle verbal and
email communications, he discovers that some staff members are lax about how well they
protect details that, when combined, might be used to reveal sensitive details about some
customers. What is the focus of his concern?
A. | Personally identifiable information (PII) |
B. | Integrity |
C. | Authentication |
D. | Domain Name System (DNS) |
Question 4
Which of the following is closely associated with maintaining data integrity?
A. | Nonrepudiation |
B. | Redundancy |
C. | Encryption |
D. | Hash |
Question 5
Brianna is an IT technician. She is studying a threat that holds the communication channel open
when a TCP handshake does not conclude. What kind of attack does this involve?
A. | Denial of service (DoS) attack |
B. | The interception of transaction data |
C. | Unauthorized persons breaching a server's document tree |
D. | Hackers accessing information on a server |
Question 6
Tonya is redesigning her company's network infrastructure to accommodate rapid growth.
Several departments are highly specialized. Tonya needs to allow Network News Transfer
Protocol (NNTP) on some, but not all, subnets. Her budget is limited. Which of the following is the best solution?
A. | Configure existing routers to filter NNTP packets. |
B. | Install firewalls at each network segment with rules to filter specific traffic for each one as required. |
C. | Install firewalls at the demilitarized zone (DMZ) to filter packets by protocol, port, and destination subnet, and then perform port forwarding. |
D. | Configure the native firewall on each workstation to filter traffic based on the requirements for the subnet they're on |
Question 7
Demetrice is a network consultant. She has been hired to design security for a network that
hosts 25 employees, many of whom need remote access. The client recently opened another
small office in a neighboring community and wants to be able to routinely establish secure
network connections between the two locations. The client often deals with customer bank
information and requires a particularly secure solution. What is her response to these
requirements?
A. | Intrusion detection system/intrusion prevention system (IDS/IPS) with Remote Desktop Connection support |
B. | Web proxy with content filtering and network address translation (NAT) mapping |
C. | Snort intrusion detection system (IDS) |
D. | Small office/home office (SOHO) virtual private network (VPN) |
Answered by usernamename11
sum
usce
ec f
ipsu
itur
a mo
o. D
Unlock full access to Course Hero
Explore over 16 million step-by-step answers from our library
Subscribe to view answerongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vi
gue
lestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipis
gue
Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus
gue
or nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consect
gue
Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultric
gue
et, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam ri
gue
trices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices a
gue
gue