Question: . (TCO 9) Why does the textbook author state that technology alone is not a panacea for network security problems? (Points : 5) Advances in
| . (TCO 9) Why does the textbook author state that technology alone is not a panacea for network security problems? (Points : 5) |
Advances in technology occur too rapidly for security pros to keep up with them. Improvements in technology actually create the most security problems. Technology cannot be effective if people do not follow appropriate procedures. The author actually does say that technology solves network security problems.
| (TCO 8) Which of the following security templates are included in Windows servers? (Points : 5) |
HIsecdc, Hisecws, Websec, IPSec DC security Securews, Rootsec, Supersec Rootsec, Supersec Websec, IPSec DC security, HIsecdc, Hisecws, Securews
| (TCO 8) Which of the following would not be a default account on a Windows machine? (Points : 5) |
ASP.NET Administrator IUSR_machine name username
| (TCO 7) Which of the following is the most common method by which viruses spread? (Points : 5) |
By reading the e-mail address book and mailing itself to everyone listed By broadcasting ICMP packets and following network connections By accessing the web application and cloning sent mail By users downloading and installing unauthorized files from the Web
| (TCO 7) What is the purpose of spyware? (Points : 5) |
To manage popups and prevent nuisance advertising To monitor a system, gain access to log on information, and allow access to from the outside To monitor a system, gather information, and send it to a home system To prevent others from detecting the presence of your computer on the network
| (TCO 6) A good definition of VPNs is that they are a combination of which of the following? (Points : 5) |
Internet, leased lines, direct access, dial up Tunneling, encryption, authentication, access control Tunneling, dial up, authentication, Cisco, SNORT Encryption, leased lines, ISP, piggy backing
| (TCO 6) Which protocols compromise IPSEC? (Points : 5) |
ESP, IPComp, AH, IKE Tunnel, Transport, IETF, MPPE IPComp, AH, IETF, MPPE AH, ESP, Tunnel, Transport
| (TCO 5) Which of the following statements is a weakness of symmetric encryption? (Points : 5) |
Modern math processors can break it quickly. It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular. Because the key must be transmitted, the scheme is only as secure as your transport method. Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.
| (TCO 5) Which of the following is a widely used public key system that is considered by many experts to be very secure and is available as a plug-in for MSN messenger and other communication software? (Points : 5) |
AES Blowfish IDEA PGP
| (TCO 4) What profiling types are used in anomaly detection? (Points : 5) |
Deflection and deterrence Threshold and resource Infiltration and preemptive blocking Snort and Cisco intrusion detection
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
