ITSA255_Test1Review_Fall2017 #51-60
Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?
Applying security updates promptly
Which one of the following is an example of a disclosure threat?
Espionage
Which network device is capable of blocking network connections that are identified as potentially malicious?
Intrusion prevention system (IPS)
Tony is working with a law enforcement agency to place a wiretap pursuant to a legitimate court order. The wiretap will monitor communications without making any modifications. What type of wiretap is Tony placing?
Passive wiretap
Which tool can capture the packets transmitted between systems over a network?
Protocol analyzer
Which term describes any action that could damage an asset?
Threat
Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.
True
Networks, routers, and equipment require continuous monitoring and management to keep wide area network (WAN) service available.
True
Rootkits are malicious software programs designed to be hidden from normal methods of detection.
True
Which one of the following is typically used during the identification phase of a remote access connection?
Username