"Final"

Ace your homework & exams now with Quizwiz!

In an IDPS, specific indications of a possible attack are called

Signatures

When one host wants to initiate a TCP session with another host, it sends a packet with the ___ flag set

SYN

Which of the following is an advantage of using a hardware firewall rather than a software firewall?

Scalability Increased output

Which of the following is the process of listening on each available channel for an AP's Beacon

Scanning

When using symmetric and asymmetric algorithms to encrypt the same amount of data, which of the following statements is correct?

The symmetric algorithm encrypts data faster than the asymmetric algorithm

Servers with outside access to the public should be located on __________.

Their own subnet a DMZ

Which is the most secure wireless implementation?

WPA2-AES Personal

To avoid attacks that use advanced evasion techniques, such as path obfuscation CGI scripts, and packet injection, you must do which of the following

Watch your log files closely Keep your IDPS signature files updated

Which of the following attack methods target Web users? (Choose all that apply.) a. social engineering b. phishing c. SQL injection d. pharming

b phishing d pharming

Which of the following IP addresses is most likely to be the source IP address of an encapsulated VPN packet? a. 150.80.26.59 b. 172.30.78.45 c. 11.17.5.210 d. 210.240.255.48

b. 172.30.78.45

Which of the following is caused by a flaw in how a running process allocates memory to a variable? a. unsecured cryptographic storage b. buffer overflow c. broken authentication d. SQL injection

b. Buffer overflow

Which of the following is an advantage of centralized data collection? a. reduced traffic through network gateways b. reduced administrative costs c. reduced software and hardware costs d. only one person needed to review data

b. reduce admin cost C. reduce software and hardware cost

Why would you choose distributed data collection rather than centralized data collection? a. to reduce traffic through gateways b. to reduce the load on security managers c. to reduce overall costs d. to reduce hardware and software costs

b. reduce the load on security managers

In a SQL injection attack, which character is an attacker most likely to use? a. asterisk b. single quotation mark c. exclamation mark d. double quotation mark

b. single quotation mark

The ultimate goal of a security policy is which of the following? a. reducing the risks to zero b. doing it right the first time so the policy does not have to be rewritten constantly c. convincing management that the IT budget should be increased d. none of the above

d. none of the above

The distance between midpoint of a wave is called

wavelength

In CIDR notation, the IP address and subnet mask 191.9.205.22 255.255.192.0 are written as __________________.

191.9.205.22/18

A Class C address has a first octet decimal range of ____________ to ____________.

192, 223

An ICMPv6 is indicated by a Next Header Value of _____

58

Which authentication method does WPA2 Enterprise Security Use?

802.1x

A group of authentication and encryption settings that two computers negotiate to set up a secure VPN connection is called which of the following? a. protocol b. Security Association c. handshake d. key exchange

B. Security Association

Which of the following features distinguishes IPv6 from IPv4?

IPv6 fragmentation occurs only at the source node

A firewall policy does which of the following?

Identifies and mitigates risks explains how the firewall is set up, managed and updated Specifies how the firewall should handle app0lication traffic

what function does an SSID serve on a wireless network?

Identifies the network name

The number of TCP segments that can be sent before an acknowledgement must be received is determined by the __

Sliding window size

Which of the following parameters con you find in a standard access control list?

Source IP address Source port number

Which of the following is the correct order in which TCP flags appear during the initiation of a normal connection?

Syn, Syn/Ack, Ack

Which of the following combines a hashed message authentication code with a shared secret key, processes each half of the input data with different hashing algorithms and recombines them with XOR function?

TLS

The Class A address of 127.0.0.1 is used for which of the following

Testing the local TCP/IP software implementation

A station can be authenticated without being associated.

True

A signature-detection IDPS can be circumvented in which of the following ways?

changes in attack methods

What is the name of an error-checking procedure that uses a formula to calculate a numeric value?

checksum

Which of the following is almost inevitable and should be expected after installing an IDPS?

false negatives huge log files signatures that become outdated fals positives

Which of the following is considered an advantage of spread spectrum over narrowband wireless transmissions

increased security decreased susceptibility to interference

What are some of the reasons for network attacks

industrial espionage. revenge financial gain

Wireless communication emits which types of EM radiation?

infrared radiation radio frequency waves

Protocols that guide a router's decisions on packet forwarding based on the current condition of the network are___

link-state protocols

what type of IDPS should you use if your main concern is preventing known attacks?

signature-based IDPS

How can an inline sensor be positioned to reduce the load on a perimeter security device, such as a firewall or router?

Place the sensor outside the security perimeter

A VPN server configured to receive PPTP traffic listens for incoming connections on port and needs to receive GRE traffic identified by protocol ID. a. UDP 1443, 17 b. TCP 1723, 47 c. UDP 3349, 443 d. UDP 1723, 47

B. TCP 1723,47

The stateless packet filters are more secure than the stateful filters because they do not contain a state table that can be exploited by an attacker. True or false

False

To isolate all external Web requests to a specific Web sever on the DMZ, it would be best to use many - to - one NAT? true or false

False

To keep log files organized, store them on the server you are monitoring. True or False?

False

Which of the following features are typical of dynamic routing protocols?

Faster convergence Increased network traffic

Why is fragmentation considered a security risk?

Fragment numbers 1 or higher are passed through filters

How do atackers use fragmentation to circumvent network defenses

Fragments are crafted to be too large or too small the initial packet is missing the fragments arrive too slowly

Which of the following is a reason that IPsec has become the standard protocol for tunneled communication?

IPsec supports IPv4 and IPv6 IPsec can encrypt the entire packet

What advantages does IPv6 have over IPv4?

IPv6 uses a 128-bit address space IPv6 incorporates IPsec

Which of the following describes a goal of a security event management program? a. consolidating events from multiple sources b. responding to events as quickly as possible c. conducting forensics to trace and prosecute offenders d. managing IDPS signatures

A. consolidating events from multiple sources

What is a requirement for a successful file attachment attack? a. The user must open the file attachment. b. The user must reply to the e-mail that contains the attachment. c. The user must delete the file attachment immediately. d. The attachment must be an image file.

A. the user must open the file attachment

WPA2 uses which of the following for encryption?

AES

To configure a router using a telephone connection, you would connect to the ____ port.

AUX

Firewall enforcement of policies is handled primarily through setting up packet-filtering rules, a set of which is contained in the

Access control list

Which port is used for name/address resolution?

Port 53

When you request a web page, which port does the web server use to send you the page.

Port 80

Packet filters can block or allow transmission of packets based on which of the following criteria?

Port number Time of access attempt IP address

The windows RPC service works like the UNIX _________ service

Portmapper

Which program keeps track of services and ports made available through remote procedure call?

Portmapper

How do routers handle packets that are too large to pass through because of frame size limitations?

Routers break packets into smaller piece fragment

Almost every type of firewall depends on what configurable feature for its effectiveness?

Rule Base

Which of the following default settings should you change before connecting to a device?

SSID Channel

Authentication Header verifies the integrity of TCP/IP packets by signing them with a digital signature.

True

Even though 802.11 wireless devices can hold up to four keys simultaneously, they have to use the same tone to communicate with each other.

True

Given the multiple and varied demands on network administrators, those in charge of small-to-medium sized networks should probably purchase a vendor-supplied turn-key perimeter firewall solution.

True

Which of the following is an example of a reconnaissance traffic signature

ping sweep

Misuse-based detection is based on which feature of network traffic?

signatures

An IP address combined with a TCP/IP port number is called which of the following?

socket

An IDPS management server preforms which of the following functions?

storing and analyzing sensor data

Frequency is defined as

the number of times an event occurs in a specified period

For which of the following reasons would you consider creating a protected subnet within an already protected internal network?

to protect customer information to protect management servers to protect the company's reputation to protect the web servers

Which IDPS activity could detect a DoS attack?

traffic monitoring

The maximum departure of a wave from its undisturbed state is call which of the following?

amplitude

Which of the following is not required for single-packet attacks?

an ICMP flood

Which intrusion detection method is almost impossible for intruders to test before attempting an attack?

anomaly detection

All Cisco access control lists require d. a deny all statement as the last access control entry

at least one permit statement

Putting a VPN on the firewall has which of the following disadvantage?

b only one server controls security so any configurations errors leave the network open to attack. c. Internet access and VPN traffic compete for resources on the server.

Attackers often use DNS cache poisoning to do which of the following?a.Query systems on a network one by one b. Steer unsuspecting users to a server of their choice c. Flood the network with packets and cause it to crash d. Install a virus on the network.

b steer unsuspecting users to a server of their choice instead of the Website where users intended to go

Survivable Network Analysis begins with what assumption? a. that you have laid the groundwork for a risk analysis b. that your network will be attacked c. that the probability of threats is increasing constantly d. that an effective security policy can reduce risks to zero

b. that you have laid the groundwork for a risk analysis

Which of the factors enables attackers to program ActiveX controls to run malicious code on a user's Web browser a.They run in a sandbox b. They do not require user action to be activated c.They run automatically when the browser loads the Web page d.They have almost full access to the Windows OS

b.ActiveX controls do not require user action to be activated. c. ActiveX controls run automatically when the browser loads the webpage that contains them d. ActiveX controls have almost full access to the Windows OS

Which of the following is an IDPS detection capability you can customize?

blacklists signatures thresholds

In tunnel mode, Encapsulating Security Payload encrypts which of the following?

both header and data

What is an escalation procedure? a. how network security can be improved in stages. b. how a virus can multiply and affect more assets. c. different levels of response based on incident severity. d. employees who should be involved in the response.

c. It describes different levels of response based on incident severity. d. It identifies employees who should be involved in the response

A password policy should be established in the and enforced by whenever possible. a. risk assessment process, management b. company Web site, network administrators c. security policy, software d. company employee handbook, security guards

c. Security policy software

Which of the following sections of a security policy affects the most people in an organization? a. incident handling policy b. privileged access policy c. acceptable use policy d. remote access policy

c. acceptable use policy

What are the hardware, software, and informational resources you need to protect? a. threats b. tangibles c. assets d. business holdings

c. assets

Which of the following technologies helps protect sensitive data even after it has been stolen from a secured medium? a. virus protection b. authentication c. encryption d. Spybot

c. encryption

IPsec provides for what security activity to take place before data is encrypted or transmitted? a. encapsulation b. authentication c. establishment of a Security Association (SA) d. application of security policy settings

c. establishment of a Security Association

The Internet backbone is connected to regional ISPs via which of the following? a. POP ISPs b. network service points c. network access points d. carrier network points

c. network access points

Which of the following, if worded correctly, can protect companies from wrongful termination lawsuits? a. nondisclosure clauses b. acceptable use policies c. penalty clauses d. punitive clauses

c. penalty clauses

Which of the following issues public and private key pairs?

certificate authority

Which of the following is used to check whether a certificate is still valid?

certificate revocation list

An anomaly-based IDPS can be circumvented in which of the following ways?

change in user habits

To enable SHH on a Cisco router, you should ____

create RSA keys

A password policy might specify which of the following attributes for password selection? a. length requirements b. complexity requirements c. frequency for changing passwords d. all of the above

d. all of the above

employees who connect remotely what are security concerns? a. mobile devices being stolen b.virus infections spreading to corporate systems c.the use of updated d. all of the above

d. all of the above

To determine the value of hardware and software you need to protect, which of the following approaches is easiest to use? a. getting the most recent prices online b. keeping records of purchase costs c. using your experience and expertise d. interviewing support personnel

d. interviewing support personnel

Which of the following provides employees with formal instructions about the organization's security strategy? a. acceptable use policy b. risk assessment c. strategy meeting d. security user awareness program

d. security user awareness program

When should an organization conduct a new round of risk analysis? a. every month b. every three months c. as frequently as possible d. when equipment or staff change significantly

d. when equipment or staff change significantly

Which of the following is used to provide a relative measurement of RF power?

decibels

What type of infrared transmission relies on reflected light?

diffused IR transmission

Hardening a bastion host involves which of the following measures?

disabling unnecessary services removing unnecessary accounts Installing current patches all of the above

A site survey helps accomplish which of the following

evaluation what type of antennas to use Identifying where APs should be placed

Which of the following addresses are valid IPv6 addresses?

fe80::a02a:64b0:27a9:c73b fe80:cd5c::f40f:9eea:7580

What is the purpose of the 4-byte acknowledgement number in a TCP header?

it acknowledges receipt of the previous packets in the sequence

Which of the following can be included in network traffic signature

logon attempts TCP Options

Which of the following IDPS results in the cause of greatest concern?

False negatives

All type of electromagnetic radiation are collective called

EM spectrum

Having an abundance of APs in a wireless network improves security

False

In a Cisco ASA 5505 firewall, security level 100 is the least secure level. True or False

False

Infrared wireless is extremely fast, can travel long distances, and is not susceptible to interference

False

Radio waves striking an antenna create infrared radiation?

False

Refraction occurs when RF signal is dispersed by small objects, such as raindrops or foliage

False

A rule base should end with a ______________ rule.

Cleanup

AH uses protocol ID . a. 50 b. 171 c. 500 d. 51

D. 51

An uninterruptible power supply is a component of _____________ security.

Physical

Which of the following OSI layers are most important in a wireless network?

Physical Network Data Link

In a mesh topology, all participants in the VPN have with one another. a. tunnels b. SAs c. static routes d. trusts

B. SAs

Which of the following issues should you consider in firewall design.

Fault Tolerance Log Size Authorization Load Balancing

Which of the following are routing protocols?

EIGRP RIP

A Firewall can do which of the following?

Filter traffic based on rules. Provide a layer of protection for the network

Which of the following is a common type of signal loss

diffraction scattering

The change management process might apply when which of the following occurs? a. New password logon procedures are needed. b. You need to block access to DMZ servers. c. A new VPN gateway is installed. d. You need to change a fragmentation rule in a packet filter.

A. New passwords logon procedures are needed C. A new VPN gateway is installed

IEEE 802.11ac is expected to support a bandwidth of

1000 Mbps

Compressing the IPv6 address 1080:0:0:0:8:800:200C:417A results in which of the following?

1080::8:800:200C:417A

Which of the following IP addresses would be filtered by an access control entry that contained an IP address and inverse mask specifications of 12.96.115.77 0.15.255.255?

12.104.146.190 12.11.115.77

What is the block size in the AES implementation of Rijndael?

128,192, or 256 bits

How can you gather information on a variety of security events and respond to it quickly? a. Assemble a large response team. b. Use distributed data collection. c. Automate data collection and analysis. d. Outsource security management.

A. Assemble a large response team

Because of an increase in the use of Web-based business applications, there has been an increase in -based VPNs. a. SSL b. IPsec c. L2TP d. PPTP

A. SSL

Which of the following is a type of security audit? a. automated b. independent c. centralized d. operational

B. Independent D. Operational

Where should you place the most important rules in a rule base?

At the top of the rule base

Security devices on a network process digital information, such as text files and Web pages, in the same way. However, which of the following pieces of information might they handle differently

Attack signatures

Which of the following employees has primary responsibilities that include maintaining and strengthening network defenses? a. security incident response team leader b. computer security manager c. chief information officer d. security auditor

B. Computer security manager

What can happen if you change a security configuration too abruptly and without proper authorization? a. Employees might ignore the change. b. The change might surprise other security managers. c. You might be flooded with protests from employees. d. You could face disciplinary action.

B. The change might surprise other security managers C. You might be flooded with protest from employees

Which protocols and ports must be allowed to pass when you are using L2TP and IPsec? (Choose all that apply.) a. protocol ID 50 b. UDP 500 c. TCP 50 d. protocol ID 1701

B. UDP 500 D. protocol ID 701

In a restrictive firewall policy, what is the starting point for developing a rule base

Block all traffic

How many root servers are in the DNS infrastructure? a. 10 b. 11 c. 13 d. 14

C. 13

What is a main disadvantage of mesh VPNs? a. They are not reliable. b. There is a lack of confidentiality among peers. c. They are difficult to enlarge or change. d. The equipment must be the same at all sites.

C. They are diffcult to enlarge or change

The VPN connection through which data passes from one endpoint to another is called a(n) . a. gateway b. extranet c. tunnel d. transport

C. Tunnel

When should you follow the procedure for carrying out change shown in Figure 14-4? a. when many employees will be affected by the change b. when the change is needed urgently c. whenever a change needs to be made to security configurations d. when the change will have a substantial impact

C. Whenever a change is needed to be made to security configurations

Which control frame give a station permission to transmit?

CTS - Clear to Send

Which of the following is an advantage of using a software firewall rather than a hardware firewall.

Cost

Why are cryptographically secure pseudorandom number generators so important to cryptography?

Cryptographic primitives used to generate sequence of numbers that approximate random values.

An attacker who causes harm to systems in support of some principle is categorized as which of the following?

Cyber terrorist

What is a realistic goal of ongoing security management? a. blocking all suspicious packets b. tracing all attacks c. tracing as many intrusion attempts as possible d. continually strengthening and modifying defenses

D. Continually strengthening and modifying defenses C. Tracing as many intrusion attempts as possible

What is an auditing program in which current connections are scanned and alerts are generated after suspicious logon attempts? a. social engineering b. port scan c. event monitoring d. Tinkerbell program

D. Tinkerbell program

What makes a VPN a cost-effective option? a. Computers can use the same hardware and software. b. It requires no administrative configuration to set up or maintain. c. Many VPN applications are available as shareware or freeware. d. VPNs use public Internet and ISP connections.

D. VPNs use public Internet and ISP connections

When securing an Apache Web server, which tasks is not necessary? a. installing the latest Apache patches b. disabling processing of server-side includes c. deleting unneeded or default Apache files and sample code d. creating a privileged user ID for the Apache Web User account with root access

D. creating a privileged user ID for the Apache Web User account with root access

Before installing new signatures for an IDPS, what do you need to do? a. Back up the IDPS. b. Stop the IDPS. c. Change passwords. d. Double-check to verify whether new signatures are necessary.

D. double-check to verify whether new signatures are necessary

Which of the following is a symmetric algorithm that is not considered safe for encryption use?

DES

Which of the following frames carries TCP/IP packets in a wireless network?

Data

Name 4 goals of network security

Data confidentiality Data integrity Data availability Ensuring Privacy

The Stuxnet worm was designed to

Disrupt computer controlled industrial operations

Which of the following computers is likely to be found in a DMZ?

E-mail server Web server

Which of the following is not a best practice for VPN client management? a. Enable split tunneling. b. Disable FTP. c. Disable Telnet. d. Enable VPN quarantine.

Enable split tunneling

A DNS server translates ____ to _____.

FQDNs to IPaddress

Which protocol uses one port number to establish a connection and a different port number to transfer data?

FTP

Which of the following functions can a bastion host perform?

FTP server e-mail server

A Web server can be hardened just by configuring the Web application correctly. True or False?

False

A bastion host is usually located on the internal network? True or False

False

A firewall is an effective stand-alone security solution. True or false

False

A packet filtering device evaluates data in the payload and compares it with a predefined set of rules

False

An HIDPS can detect an intrusion attempt that targets the entire network, such as a port scan on a ranged of computres

False

Cisco encryption type 7 is the strongest encryption method available on the router?

False

For optimum efficiency, configure a domain controller to function also as an IIS Web server. True or False?

False

A socket is a combination of an ______and a ____________

IP and Port number

Stateless packet filters allow or block packets based on which of the following?

Information in protocol headers

Most network threats originate from which of the following

Inside the company

In which of the following situations can CVE improve the coordination of intrusion information on a network?

Installing application patches can thwart a reported attack

In which of the following situations can CVE improve the coordination of an intrusion detection system

Installing application patches can thwart a reported attack.

A proxy server ___________.

Is designed to improve web access Can filter Application layer content

What is the purpose of a beacon frame?

It advertise services or information about the wireless networkk

How can data gained from intrusion detection improve network security?

It can help prevent future attacks it can help determine how to respond to a security incidents

Why is UDP considered unreliable

It is connectionless

Why is digital modulation superior to analog modulation?

It makes more efficient use of bandwidth. It has fewer interference problems. Error correction is more compatible with other digital systems. Less power is required to transmit.

What enables servers in a server farm to work together to handle requests?

Load balancing software

In digital signatures, which of the following values is compared to verify a message's integrity?

Message digest

Define cryptographic primitives

Modular mathematical functions that perform one task reliably. They form the basic building blocks of modern cryptography.

____is used for one to many communication in which a single host can send packets to a group of recipients?

Mullticast

Which of the following is an IPv6 Protocol?

Multicast listen detection Multicast listener discovery Neighbor discovery

Which of the following can hide internal IP addresses from the internet.

NAT Proxy servers

Which of the following is a method of hiding internal host IP addresses?

Network Address Translation Proxy servers

A packet has destination Data Link Layer address of FF-FF-FF-FF-FF-FF

Network hosts process this packet to see if it is of interest

A screening router would be an appropriate choice for meeting the security needs of a ___ a. small office network b. home network c. DMZ d. none of the above

None of the above

The capability to prevent one participant in an electronic transaction from denying that it performed an action is called ____________.`

Nonrepudiation

Which of the following components enables Ipsec to use Diffie-Hellman to create keys?

Oakley

Which of the following packets should never have a data payload?

One with SYN flag set

What preventive responses can an IDPS make to a possible attack?

Prevent malicious code from running drop the suspicious packet allow, reset, alarm reset all network connections

Which of the following is used as a cryptographic primitive?

Pseudorandom number generators feistel networks

A DMZ is _________________

Semi Trusted network

The IEEE 802.11 standard provides which of the following authentication methods?

Shared Key Open System

Which intrusion detection method can begin protecting an network immediately after installation?

Signature detection

Consider the following statements A: An ACL can be applied only to one router interface B: An ACL can apply only to one routed protocol C: An ACL can filter packet traveling in only one direction

Statement A is false, and statement B is correct.

Consider the following statements:A: Supernetting reduces the number of routes in routing tablesB: Variable length subnet masks allow router to determine whether an address is public or private.C. Statement A is true, and statement B is true.

Statement A is true, and statement B is false

Consider the following statements: A:Dynamic routing protocols decrease network security B: Static routing protocols conserve network bandwidth

Statement A is true, and statement B is true.

Which of the following packet elements can be filtered by a named ACL?

TCP flags noninitial fragments destination ports source IP addresses

What is the main problem with using a screening router?

The router alone cannot stop many types of attacks

Which of the following is a guideline for developing a firewall rule base?

The rule base should restrict access to ports and subnets on the internal network from the internet. The rule base should not interfere with application traffic

Which of the following attacks might potential to exploit AES

XSL

A corporation with several branch offices has decided to maintain multiple firewalls, one to protect each branch office's network. What is the most efficient way to maintain these firewalls?

Use a centralized security workstation

Which of the following malware is designed to replicate itself?

Worm Virus

Why is it important to protect the confidentiality of information you gather through auditing? a. Employee privacy could be compromised. b. The information might become corrupted when you store it. c. Intruders could discover passwords. d. Viruses could infect it.

a. Employee privacy could be compromised C. Intruders could discover passwords

Which of the following is an advantage of using a star VPN configuration?a. It is easier to increase the VPN's size b. Fewer VPN hardware or software devices are required c. Only the VPN server at the center or "hub" needs to be updated d. All participants can communicate with all other participants

a. It is easier to increase the VPN's size

Attackers can exploit routing information updates to do which of the following? (Choose all that apply.) a. Launch DoS attacks. b. Poison DNS caches. c. Use IP spoofing to intercept packets. d. Launch man-in-the-middle attacks.

a. Launch DoS attacks c. Use IP spoofing to intercept packets d. Launch man in the middle attacks

Which of the following is a common type of SQL injection attack? (Choose all that apply.) a. Web form attack b. browser executable attack c. system tray attack d. query string attack

a. Web form attack d. query string attack

Which of the following situation would a wireless network be an effective alternative?

a. a business that occupies temporary space b. a network with employees who travel c. an older building with no wiring

A risk analysis report should call attention to. a. all identified risks b. the most urgent risks c. the newest risks d. the risks that are easiest to manage

a. all identified risk

Ensuring that databases remain accessible if primary systems go offline is known as . a. fault tolerance b. failover c. redundancy d. resiliency

a. fault tolerance

In a DNS zone transfer, what is actually transferred? a. fully qualified domain names and IP addresses b. usernames and passwords c. server MAC addresses d. UDP and ICMP messages

a. fully qualified domain names and IP addresses

Security auditing involves which of the following? a. reviewing log files b. reviewing hardware and software costs c. testing defenses d. rotating firewall logs

a. reviewing log files c. testing defenses

What is nonrepudiation? a. the ability of a system to authenticate users b. the ability to rely on information gained through a security audit c. a legal defense used by employees whose privacy has allegedly been violated d. the ability to validate transactions through electronic documentation

a. the ability of a system to authenticate users.

What client-side issues do you need to consider when planning a VPN deployment?a. whether to require the client to use a firewall b. the organization's current growth rate c. how policies should be enforced on the client computer d. the cost of equipment that employees need to buy

a. whether to require the client to use a firewall c. how policies should be enforced on the client computer.


Related study sets

Música de los Pobres a Los Ricos Preguntas

View Set

TEMA 1: Conceptualización general y desarrollo psicológico

View Set

System of Linear Equations - Part 1

View Set

Data and Info. Management Chapter 8 continued (Marist College Eitel Lauria)

View Set

Dr Jekyll and Mr Hyde Annotations

View Set

Cells, synapses, and Neurotransmitters

View Set

AMT General Prep ----- Materials and Processes

View Set