Save Time & improve Grades
- Questions Asked
- Experts
- Total Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!
Question 1. Question : (TCO 6) In terms of physical security, _____ refers to protecting important assets by using several perimeters. layered access multifactor access control dual authentication an intrusion-detection system Question 2. Question : (TCO 6) Which of these, according to this chapter, is not a step that can be taken to help mitigate physical security risk? All users need security training. Electronic physical security systems need to be protected from network-based attacks. Authentication systems should use multiple factors when feasible. Constantly monitor all employees via camera. Question 3. Question : (TCO 6) The best fire extinguisher for petroleum products is a _____. Class A Class B Class C Class D Question 4. Question : (TCO 6) _____ are computers in a network that host applications and data for everyone to share. Linux boxes Servers Firewalls Cryptographies Question 5. Question : (TCO 6) A virtual private network (VPN) is a construct used to provide _____. users with an individual web space on the network an area of relaxation for employees a secure communication channel between users across public networks, such as the Internet a learning area for programming languages Question 6. Question : (TCO 6) Media can be divided into three categories: _____. paper, plastic, and cloth magnetic, optical, and electronic confidential, integrity, and authority red, yellow, and blue Question 7. Question : (TCO 6) _____ are types of magnetic media. CDR, CDRW, and DVD Linux, Windows, and Oracle Hard drives, diskettes, and tapes Keyboards, mice, and monitors Question 8. Question : (TCO 6) Which of the following is not a component of an IDS? Traffic collector Signature database Expert-knowledge database User interface and reporting Question 9. Question : (TCO 6) A new breed of IDS that is designed to identify and to prevent malicious activity from harming a system is called _____. preemptive IDS preventive IDS active IDS dynamic IDSA Question 10. Question : (TCO 6) Egress filtering _____. scans incoming mail to catch SPAM scans outgoing mail to catch SPAM scans messages for specific words or phrases filters out POP traffic
Ask a question
Experts are online
Answers (1)
SEC280 Week 5 Quiz latest 2016 (Score 100%)
Answer Attachments
1 attachments —