Question: [T/F] 1. All parasitic malware is software that replicates. [T/F] 2. A stealth virus is explicitly designed to hide itself from detection by antivirus software.
[T/F] 1. All parasitic malware is software that replicates.
[T/F] 2. A stealth virus is explicitly designed to hide itself from detection by antivirus software.
[T/F] 3. Two important SSL concepts are the SSL session and the SSL connection.
[T/F] 4. Ports are logical entities defined within the authenticator and refer to physical network connections.
[T/F] 5. An uncontrolled port allows the exchange of PDUs between a supplicant and other systems on the LAN only if the current state of the supplicant authorizes such an exchange.
[T/F] 6. The Host-based IDS monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
[T/F] 7. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.
[T/F] 8. The primary benefit of a host-based IDS is that it can detect both external and internal intrusions.
[T/F] 9. A typical use of circuit-level gateways is a situation in which the system administrator trusts the internal users.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
