ITSA255_Test1Review_Fall2017 #51-60

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?

Applying security updates promptly

Which one of the following is an example of a disclosure threat?

Espionage

Which network device is capable of blocking network connections that are identified as potentially malicious?

Intrusion prevention system (IPS)

Tony is working with a law enforcement agency to place a wiretap pursuant to a legitimate court order. The wiretap will monitor communications without making any modifications. What type of wiretap is Tony placing?

Passive wiretap

Which tool can capture the packets transmitted between systems over a network?

Protocol analyzer

Which term describes any action that could damage an asset?

Threat

Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.

True

Networks, routers, and equipment require continuous monitoring and management to keep wide area network (WAN) service available.

True

Rootkits are malicious software programs designed to be hidden from normal methods of detection.

True

Which one of the following is typically used during the identification phase of a remote access connection?

Username


Ensembles d'études connexes

Economics: Supply and Demand Open Note Quiz

View Set

Ports (System Admin Certification)

View Set

Internet, Intranet, & Social Media Terms

View Set

Language of Medicine Chapter 16-Abbreviations

View Set