IT-6310 - Network Security oed answer key

Showing 21 to 30 of 30 total answers.

#IT-6310
Awesome StudentQuestion • Network Security

It helps prevent attackers from monitoring or recording traffic between resources and computers.

Answer

data encryption

#IT-6310
Awesome StudentQuestion • Network Security

This is an enhanced encryption protocol combining a 104-bit key and a 24-bit initializing vector.

Answer

WEP 128

#IT-6310
Awesome StudentQuestion • Network Security

These are the events or attacks that remove, corrupt, deny access to, allow access to, or steal information.

Answer

data security attacks

#IT-6310
Awesome StudentQuestion • Network Security

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks.

Answer

True

#IT-6310
Awesome StudentQuestion • Network Security

Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access

Answer

True

#IT-6310
Awesome StudentQuestion • Network Security

Preventive security is implemented by the tasks and tools you use to prevent unauthorized people or programs from accessing your networks and the devices connected to them.

#IT-6310
Awesome StudentQuestion • Network Security

A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted "tunnel" across the open internet

#IT-6310
Awesome StudentQuestion • Network Security

If there's one common theme among security experts, it's that relying on one single line of defense is dangerous, because any single defensive tool can be defeated by a determined adversary.

#IT-6310
Awesome StudentQuestion • Network Security

As a philosophy, it complements midpoint security, which focuses on individual devices; preventive security instead focuses on how those devices interact, and on the connective tissue between them.

#IT-6310
Awesome StudentQuestion • Network Security

Human beings are inevitably the weakest security link. You need to implement technologies and processes to ensure that staffers don't deliberately or inadvertently send sensitive data outside the network.

Page 2 of 2