Data Security

Satisfactory Essays
Subnetting __________.

b. is also called subnet addressing

2. A virtual LAN (VLAN) allows devices to be grouped __________.

a. logically

3. Convergence combines voice, data, and video traffic __________.

a. over a single IP network

4. Each of the following is a convergence security vulnerability except __________.

a. convergence resource attacks (CRA)

5. Which of the following is not true regarding a demilitarized zone (DMZ)?

a. It contains servers that are only used by internal network users.

6. Network address translation (NAT) __________.

c. removes private addresses when the packet leaves the network

7. Each of the following is a variation available in network access control (NAC) implementations except __________.

c. network or local

8. Another name for a packet filter is a __________.

b. firewall

9. The __________ establishes the action that a firewall takes on a packet.

b. rule base

10. A(n) __________ intercepts internal user requests and then processes that request on behalfof the user.

a. proxy server

11. A reverse proxy __________.

b. routes incoming requests to the correct server

12. A honeypot is used for each of the following except __________.

b. filter packets before they reach the network

13. A __________ watches for attacks but only takes limited action when one occurs.

a. network intrusion detection system(NIDS)

14. A multipurpose security appliance integrated into a router is known as a(n) __________.

b. integrated network security hardware device

15. Each of the following can be used to hide information about the internal network except__________.

d. protocol analyzer

16. The difference between a network intrusion detection system(NIDS) and a network intrusion prevention system (NIPS) is that __________.

c. a NIPS can take extended actions to combat the attack

17. A variation of NAT that is commonly found on home routers is

You May Also Find These Documents Helpful

  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    4. Provide at least two examples of how the enclave requirement to place a firewall at the perimeter can be accomplished.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    i. The first element is the access mode. It can be public, private, protected, or not appear at all.…

    • 939 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Data protection & security What is Data Protection and Security ? This is the protection of data such as database from accidental, unauthorised or malicious access Data Protection Act Data protection Act controls and monitors the way personal and customer information is been used by organisations. The Data Protection Act 1998 (DPA 1998) is an Act of the UK parliament…

    • 343 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 3 Review

    • 316 Words
    • 2 Pages

    7. Suppose you have a workstation that uses the IP address 203.12.176.55 on a traditional IPv4 network. To what network class does the workstation belong?…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Security

    • 549 Words
    • 3 Pages

    In discussing crime trends, it is important to understand the economic and political factors at the time that may have influenced the crime rate (example: economic recession; war; economic prosperity; etc). What variety of factors do you think influence the crime rate? Where do you think crime is most prevalent and why? In your postings be certain to discuss the issues of race, class, and gender.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Data Integrity

    • 500 Words
    • 3 Pages

    This section describes the rules that can be applied to table columns to enforce different types of data integrity.…

    • 500 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information Privacy

    • 1285 Words
    • 6 Pages

    Without a doubt, we live in an environment where integrity, respect and good ethics play a fundamental role in the growth and success of many individuals and companies. Unfortunately, this was not the case for Patricia Dunn, former chairman of the Hewlett-Packard (HP) board of directors who was forced to resign her job. She was at the center of a major controversy regarding her effort to investigate who from the board was leaking confidential information to the press about HP's interest in buying another technology company, their corporate strategy, business plans, even their deliberations over who they would hire as CEO. This was a major issue as, not only was sensitive discussions of the board made public in the media, the level of trust between each board member was greatly affected.…

    • 1285 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Database Security

    • 28580 Words
    • 115 Pages

    - 1 - Database Security *) GÜNTHER PERNUL Institut für Angewandte Informatik und Informationssysteme Abteilung für Information Engineering Universität Wien Vienna, Austria 1. Introduction 1.1 The Relational Data Model Revisited 1.2 The Vocabulary of Security and Major DB Security Threats 2. Database Security Models 2.1 Discretionary Security Models 2.2 Mandatory Security Models 2.3 Adapted Mandatory Access Control Model 2.4 Personal Knowledge Approach 2.5 Clark and…

    • 28580 Words
    • 115 Pages
    Powerful Essays
  • Powerful Essays

    Privacy and Personal Data

    • 3949 Words
    • 16 Pages

    At the outset, it must be mentioned that the concept of privacy is not a fundamental human right under the Malaysian Constitution.3 However, its importance has been recognised both, in a general sense as well as in the field of telecommunications.4…

    • 3949 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Good Essays

    CIE 33 REVIEW QUESTION

    • 1108 Words
    • 4 Pages

    6. What are some of the more common applications found in the TCP/IP protocol suite?…

    • 1108 Words
    • 4 Pages
    Good Essays
  • Good Essays

    8. Most networks use ________ to dynamically assign addresses and configure computers to use them. DHCP…

    • 440 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    how to control my

    • 258 Words
    • 2 Pages

    12. Consider a chain of processes P1, P2, ..., Pn implementing a multitiered client-server architecture. Process Pi is client of process Pi1, and Pi will return a reply to Pi1 only after receiving a reply from Pi1. What are the main problems with this organization when taking a look at the request-reply performance at process P1?…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    200 120C8

    • 250 Words
    • 2 Pages

    C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.…

    • 250 Words
    • 2 Pages
    Satisfactory Essays