- Question 1
1 out of 1 points
The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and ________ Web site.
Answer
| |||||
- Question 2
1 out of 1 points
____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage.
Answer
| |||||
- Question 3
1 out of 1 points
A ________ examines the network layer address and routes packets based on routing protocol path determination decisions.
Answer
| |||||
- Question 4
1 out of 1 points
____________ is the practice of hiding data and keeping it away from unauthorized users.
Answer
| |||||
- Question 5
1 out of 1 points
A ________ is a collection of computers connected to one another or to a common connection medium.
Answer
| |||||
- Question 6
1 out of 1 points
The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists.
Answer
| |||||
- Question 7
1 out of 1 points
Connecting your computers or devices to the ________ immediately exposes them to attack.
Answer
| |||||
- Question 8
1 out of 1 points
With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN NIC to a _____________.
Answer
| |||||
- Question 9
0 out of 1 points
Which of the following is the definition of ciphertext?
Answer
| |||||
- Question 10
1 out of 1 points
A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane.
Answer
| |||||
- Question 11
1 out of 1 points
What fills security gaps and software weaknesses?
Answer
| |||||
- Question 12
1 out of 1 points
Software vendors must protect themselves from the liabilities of their own vulnerabilities with a(n) ____________.
Answer
| |||||
- Question 13
1 out of 1 points
What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens’ private data and have proper security controls in place?
Answer
| |||||
- Question 14
1 out of 1 points
___________ is the process of transforming data from cleartext into ciphertext.
Answer
| |||||
- Question 15
1 out of 1 points
___________ is the duty of every government that wants to ensure its national security.
Answer
| |||||
- Question 16
1 out of 1 points
What name is given to an exterior network that acts as a buffer zone between the public Internet and an organization’s IT infrastructure (i.e., LAN-to-WAN Domain)?
Answer
| |||||
- Question 17
1 out of 1 points
Today, people working in cyberspace must deal with new and constantly evolving ________.
Answer
| |||||
- Question 18
1 out of 1 points
The physical part of the LAN Domain includes a __________, which is an interface between the computer and the LAN physical media.
Answer
| |||||
- Question 19
1 out of 1 points
The ________ is where the fourth layer of defense is required.
Answer
| |||||
- Question 20
0 out of 1 points
The requirement to keep information private or secret is the definition of __________.
Answer
| ||||

Комментариев нет:
Отправить комментарий