____7. The most common backup schedule is a daily on-site, incremental or differ
ID: 3622577 • Letter: #
Question
____7. The most common backup schedule is a daily on-site, incremental or differential backup, with a weekly off-site full backup.
____ 8. Remote journaling (RJ) is the transfer of live transactions to an off-site facility. RJ was first developed by IBM in 1999 for its AS/400 – V4R2 operating system.
____ 9. An HIDPS is not capable of monitoring system configuration databases, such as Windows registries.
____ 10. An IDPS is a complex system in that it involves numerous remote-monitoring agents (on both individual systems and networks) that require proper configuration to gain the proper authentication and authorization.
____ 11. If you follow a(n) "____" approach to security, set up application proxy gateways that forward requests on behalf of internal users.
a. Optimistic c. Strict
b. Cautious d. Paranoid
____ 12. A(n) ____ needs to have sufficient processor speed and memory to handle the network's present traffic and increased traffic as the network grows.
a. bastion host c. screening router
b. NAT server d. demilitarized zone
____ 13. Many operating systems perform ____, as do routers.
a. Routing c. IP forwarding
b. packet filtering d. NAT
____ 14. A(n) ____ is an application proxy setup that is connected to the Internet and hosts firewall software.
a. screening router c. multi-firewall DMZ
b. DMZ screened subnet d. dual-homed host
____ 15. In a ____ the host that runs the proxy server software has a single network interface.
a. specialty firewall c. screening router
b. reverse firewall d. screened subnet system
Explanation / Answer
7. The most common backup schedule is a daily on-site, incremental or differential backup, with a weekly off-site full backup.-TRUE
8. Remote journaling (RJ) is the transfer of live transactions to an off-site facility. RJ was first developed by IBM in 1999 for its AS/400 – V4R2 operating system.-TRUE
9. An HIDPS is not capable of monitoring system configuration databases, such as Windows registries.-False
10. An IDPS is a complex system in that it involves numerous remote-monitoring agents (on both individual systems and networks) that require proper configuration to gain the proper authentication and authorization-TRUE
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.