Question: 14) The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known
14) The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as A) access control list. B) deep packet inspection. C) intrusion filtering. D) packet filtering. 15) The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as A) deep packet inspection. B) stateful packet filtering. C) static packet filtering. D) an intrusion prevention system. 16) A well-known hacker started her own computer security consulting business. Many companies pay her to attempt to gain unauthorized access to their network. If she is successful, she offers advice as to how to design and implement better controls. What is the name of the testing for which the hacker is being paid? A) Penetration test. B) Vulnerability scan. C) Deep packet inspection D) Buffer overflow test. 17) A border router A) routes electronic communications within an organization. B) connects an organization's information system to the Internet. C) permits controlled access from the Internet to selected resources. D) serves as the main firewall. 18) is not a basic activity of the revenue cycle. A) Sales order entry B) Shipping C) Receiving D) Billing 19) Consider the following revenue cycle scenario: The company has been exposed to customer dissatisfaction and the suggested control procedure to be implemented is to install and use bar- code scanners. What is the threat
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
