SEC 280 Week 6 Quiz (Devry)
(TCO 6) In terms of physical security, _____ refers to protecting important assets by using several perimeters.
|
|
(TCO 6) Using a token and a password to authenticate is an example of_____.
|
|
(TCO 6) The best fire extinguisher for petroleum products is a _____.
|
|
(TCO 6) _____ are computers in a network that host applications and data for everyone to share.
|
|
(TCO 6) _____ are applications designed to detect, log, and respond to unauthorized network or host use, both in real time and after the fact.
|
|
(TCO 6) Media can be divided into three categories: _____.
|
|
(TCO 6) The model that most modern intrusion-detection systems use is largely based upon a model created by Dorothy Denning and Peter Neumann, called the _____.
|
|
(TCO 6) What does a host-based IDS monitor?
|
|
(TCO 6) Which of the following is not an advantage of network-based IDS?
|
|
(TCO 6) Egress filtering _____.
|
|
No comments:
Post a Comment