Question

1. Select the single best answer.
Identifying users by analyzing their personal attributes, such as face recognition is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

2. Select the single best answer.
Software generally located on routing devices (bridges, routers, and gateways) to monitor network traffic and prevent unauthorized access is
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

3. Select the single best answer.
An area between the enterprise’s first firewall to the outside world and the next firewall is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

4. Select the single best answer. A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.



$1.99
Sales0
Views61
Comments0
  • CreatedFebruary 20, 2015
  • Files Included
Post your question
5000