Question: Question 42 (4 points) _________ IDPS is focused only on protecting the server or hosts information assets. Question 42 options: 1) Host-based 2) Network-based 3)

Question 42 (4 points)

_________ IDPS is focused only on protecting the server or hosts information assets.

Question 42 options:

1)

Host-based

2)

Network-based

3)

Computer-based

4)

Server-based

Question 43 (4 points)

The ________ is a model that provides a graphical representation of the architectural approach widely used in computer and information security.

Question 43 options:

1)

NIST Role-based Model

2)

Rubiks Cube

3)

McCumber Cube

4)

NSS Architecture Cube

Question 44 (4 points)

__________________ is not a condition that must be present for Laws, policies, and their associated penalties to deter someone from breaking them.

Question 44 options:

1)

Fear of failure

2)

Fear of penalty

3)

Probability of penalty being administered

4)

Probability of being caught

Question 45 (4 points)

Which of the following is not a valid type of role when it comes to data ownership?

Question 45 options:

1)

Data owners

2)

Data custodians

3)

Data users

4)

Data validators

Question 46 (4 points)

__________is a performance value or metric that is used to compare changes in the object being measured.

Question 46 options:

1)

Benchmark

2)

Best practice

3)

Baseline

4)

Due Care

Question 47 (4 points)

Activities that scan network locales for active systems and then identify the network services offered by the host systems are called____________.

Question 47 options:

1)

Port scanning

2)

Fingerprinting

3)

Footprinting

4)

Network mapping

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!