What series of standards does the U.S National Security Agency (NSA) define to b
ID: 3716472 • Letter: W
Question
What series of standards does the U.S National Security Agency (NSA) define to block RF emanation?
Question 1 options:
A)
B)
C)
D)
Save
Question 2 (1 point)
Which term refers to a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?
Question 2 options:
A)
B)
C)
D)
Save
Question 3 (1 point)
IP cameras and __________ are specific implementations of video monitoring.
Question 3 options:
A)
B)
C)
D)
Save
Question 4 (1 point)
Which term refers to the administrative account native to Linux?
Question 4 options:
A)
B)
C)
D)
Save
Question 5 (1 point)
Which term refers to an aspect of any program that sends information about your system or your actions over the Internet?
Question 5 options:
A)
B)
C)
D)
Save
Question 6 (1 point)
Rootkits can strike firmware.
Question 6 options:
Save
Question 7 (1 point)
Which type of malware replicates exclusively through networks?
Question 7 options:
A)
B)
C)
D)
Save
Question 8 (1 point)
The cornerstone of a firewall is its demilitarized zone (DMZ).
Question 8 options:
Save
Question 9 (1 point)
Your first and last bastion of defense for your entire infrastructure?s security is at the individual __________.
Question 9 options:
A)
B)
C)
D)
Save
Question 10 (1 point)
Installing backup power in case of electrical failure is a form of __________.
Question 10 options:
A)
B)
C)
D)
Save
Question 11 (1 point)
Which technology consists of devices or software that protect an internal network from unauthorized access by acting as a filter?
Question 11 options:
A)
B)
C)
D)
Save
Question 12 (1 point)
Some adware actually installs a virus when you click on the ad.
Question 12 options:
Save
Question 13 (1 point)
Worms need host files to infect.
Question 13 options:
Save
Question 14 (1 point)
Which term refers to a single computer under the control of an operator?
Question 14 options:
A)
B)
C)
D)
Save
Question 15 (1 point)
Which type of firewall packet inspection is aware is aware of the packet?s state, as it relates to other packets?
Question 15 options:
A)
B)
C)
D)
Save
Question 16 (1 point)
Cisco uses what it calls __________ as one of its tools to implement network admission control.
Question 16 options:
A)
B)
C)
D)
Save
Question 17 (1 point)
What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer?
Question 17 options:
A)
B)
C)
D)
Save
Question 18 (1 point)
Trojan Horses replicate.
Question 18 options:
Save
Question 19 (1 point)
Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or other more exotic characteristics are all examples of __________.
Question 19 options:
A)
B)
C)
D)
Save
Question 20 (1 point)
Which tool watches for and ignores incoming DHCP requests from unknown MAC addresses?
Question 20 options:
A)
B)
C)
D)
A)
A. LeechingB)
B. HTTPSC)
C. DMZD)
D. TEMPESTExplanation / Answer
Ans1. TEMPEST
Ans2. Adware
Ans3. Closed-circuit televisions
Ans4. root
Ans5. Spyware
Ans6. True
Ans7. Worm
Ans8. False
Ans9. Hosts
Ans10. Redundancy
Ans11. Firewalls
Ans12. True
Ans13. False
Ans14. Zombie
Ans15. Stateful
Ans16 Posture assessment
Ans17. Persistent agent
Ans18. False
Ans19. Biometric devices
Ans20. DHCP snooping
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.