Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

What series of standards does the U.S National Security Agency (NSA) define to b

ID: 3716472 • Letter: W

Question

What series of standards does the U.S National Security Agency (NSA) define to block RF emanation?

Question 1 options:

A)

B)

C)

D)

Save

Question 2 (1 point)

Which term refers to a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?

Question 2 options:

A)

B)

C)

D)

Save

Question 3 (1 point)

IP cameras and __________ are specific implementations of video monitoring.

Question 3 options:

A)

B)

C)

D)

Save

Question 4 (1 point)

Which term refers to the administrative account native to Linux?

Question 4 options:

A)

B)

C)

D)

Save

Question 5 (1 point)

Which term refers to an aspect of any program that sends information about your system or your actions over the Internet?

Question 5 options:

A)

B)

C)

D)

Save

Question 6 (1 point)

Rootkits can strike firmware.

Question 6 options:

Save

Question 7 (1 point)

Which type of malware replicates exclusively through networks?

Question 7 options:

A)

B)

C)

D)

Save

Question 8 (1 point)

The cornerstone of a firewall is its demilitarized zone (DMZ).

Question 8 options:

Save

Question 9 (1 point)

Your first and last bastion of defense for your entire infrastructure?s security is at the individual __________.

Question 9 options:

A)

B)

C)

D)

Save

Question 10 (1 point)

Installing backup power in case of electrical failure is a form of __________.

Question 10 options:

A)

B)

C)

D)

Save

Question 11 (1 point)

Which technology consists of devices or software that protect an internal network from unauthorized access by acting as a filter?

Question 11 options:

A)

B)

C)

D)

Save

Question 12 (1 point)

Some adware actually installs a virus when you click on the ad.

Question 12 options:

Save

Question 13 (1 point)

Worms need host files to infect.

Question 13 options:

Save

Question 14 (1 point)

Which term refers to a single computer under the control of an operator?

Question 14 options:

A)

B)

C)

D)

Save

Question 15 (1 point)

Which type of firewall packet inspection is aware is aware of the packet?s state, as it relates to other packets?

Question 15 options:

A)

B)

C)

D)

Save

Question 16 (1 point)

Cisco uses what it calls __________ as one of its tools to implement network admission control.

Question 16 options:

A)

B)

C)

D)

Save

Question 17 (1 point)

What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer?

Question 17 options:

A)

B)

C)

D)

Save

Question 18 (1 point)

Trojan Horses replicate.

Question 18 options:

Save

Question 19 (1 point)

Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or other more exotic characteristics are all examples of __________.

Question 19 options:

A)

B)

C)

D)

Save

Question 20 (1 point)

Which tool watches for and ignores incoming DHCP requests from unknown MAC addresses?

Question 20 options:

A)

B)

C)

D)

A)

A. Leeching

B)

B. HTTPS

C)

C. DMZ

D)

D. TEMPEST

Explanation / Answer

Ans1. TEMPEST

Ans2. Adware

Ans3. Closed-circuit televisions

Ans4. root

Ans5. Spyware

Ans6. True

Ans7. Worm

Ans8. False

Ans9. Hosts

Ans10. Redundancy

Ans11. Firewalls

Ans12. True

Ans13. False

Ans14. Zombie

Ans15. Stateful

Ans16 Posture assessment

Ans17. Persistent agent

Ans18. False

Ans19. Biometric devices

Ans20. DHCP snooping

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote