Preview

Data Security

Satisfactory Essays
Open Document
Open Document
335 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Security
Subnetting __________.

b. is also called subnet addressing

2. A virtual LAN (VLAN) allows devices to be grouped __________.

a. logically

3. Convergence combines voice, data, and video traffic __________.

a. over a single IP network

4. Each of the following is a convergence security vulnerability except __________.

a. convergence resource attacks (CRA)

5. Which of the following is not true regarding a demilitarized zone (DMZ)?

a. It contains servers that are only used by internal network users.

6. Network address translation (NAT) __________.

c. removes private addresses when the packet leaves the network

7. Each of the following is a variation available in network access control (NAC) implementations except __________.

c. network or local

8. Another name for a packet filter is a __________.

b. firewall

9. The __________ establishes the action that a firewall takes on a packet.

b. rule base

10. A(n) __________ intercepts internal user requests and then processes that request on behalfof the user.

a. proxy server

11. A reverse proxy __________.

b. routes incoming requests to the correct server

12. A honeypot is used for each of the following except __________.

b. filter packets before they reach the network

13. A __________ watches for attacks but only takes limited action when one occurs.

a. network intrusion detection system(NIDS)

14. A multipurpose security appliance integrated into a router is known as a(n) __________.

b. integrated network security hardware device

15. Each of the following can be used to hide information about the internal network except__________.

d. protocol analyzer

16. The difference between a network intrusion detection system(NIDS) and a network intrusion prevention system (NIPS) is that __________.

c. a NIPS can take extended actions to combat the attack

17. A variation of NAT that is commonly found on home routers is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1 - A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    8. Computers that belong to the same domain can access a common security database of user and computer account information. That type of database on Windows 2003 domain controller servers is also known as a _____ database?…

    • 1510 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    5. Name at least 3 remote access protections or security controls that must be in place to provide secure remote access.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Also known as “reserve ports”, which are ports 1 – 1023 that are reserved by ICANN (Internet Corporation for Assigned Names and Numbers).…

    • 890 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    5. What is the difference between a traditional IP Stateful Firewall and a Deep Packet Inspection Firewall?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Better Essays

    i. The first element is the access mode. It can be public, private, protected, or not appear at all.…

    • 939 Words
    • 4 Pages
    Better Essays
  • Good Essays

    CIE 33 REVIEW QUESTION

    • 1108 Words
    • 4 Pages

    6. What are some of the more common applications found in the TCP/IP protocol suite?…

    • 1108 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 3 Review

    • 316 Words
    • 2 Pages

    7. Suppose you have a workstation that uses the IP address 203.12.176.55 on a traditional IPv4 network. To what network class does the workstation belong?…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Privacy

    • 1285 Words
    • 6 Pages

    Without a doubt, we live in an environment where integrity, respect and good ethics play a fundamental role in the growth and success of many individuals and companies. Unfortunately, this was not the case for Patricia Dunn, former chairman of the Hewlett-Packard (HP) board of directors who was forced to resign her job. She was at the center of a major controversy regarding her effort to investigate who from the board was leaking confidential information to the press about HP's interest in buying another technology company, their corporate strategy, business plans, even their deliberations over who they would hire as CEO. This was a major issue as, not only was sensitive discussions of the board made public in the media, the level of trust between each board member was greatly affected.…

    • 1285 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Database Security

    • 28580 Words
    • 115 Pages

    - 1 - Database Security *) GÜNTHER PERNUL Institut für Angewandte Informatik und Informationssysteme Abteilung für Information Engineering Universität Wien Vienna, Austria 1. Introduction 1.1 The Relational Data Model Revisited 1.2…

    • 28580 Words
    • 115 Pages
    Powerful Essays
  • Satisfactory Essays

    how to control my

    • 258 Words
    • 2 Pages

    12. Consider a chain of processes P1, P2, ..., Pn implementing a multitiered client-server architecture. Process Pi is client of process Pi1, and Pi will return a reply to Pi1 only after receiving a reply from Pi1. What are the main problems with this organization when taking a look at the request-reply performance at process P1?…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Privacy and Personal Data

    • 3949 Words
    • 16 Pages

    At the outset, it must be mentioned that the concept of privacy is not a fundamental human right under the Malaysian Constitution.3 However, its importance has been recognised both, in a general sense as well as in the field of telecommunications.4…

    • 3949 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Software Security

    • 996 Words
    • 4 Pages

    Due date: Midnight Sunday (week 12), i.e., 23:59 sharp, 27 May 2012. The assignment is submitted via Weblearn. Report must be submitted in HTML or PDF format. Programming languages HTML, JavaScript and PHP are preferred. Each submission must include the file readme.txt in the following format: StudentID: [your Student ID - without the initial "S"] Login: [your CS username] Name: [your full name] Partner Name: [your team member’s name] Partner ID: [your team member’s Student ID] Topic: [your report topic] Notes: [any other relevant information]…

    • 996 Words
    • 4 Pages
    Powerful Essays