Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
1 what is a dmz is this really an appropriate name for the technology considering the function this type of subnet
using the internet determine what applications are commercially available to enable secure remote access to a pc 5
1 what is the typical relationship among the untrusted network the firewall and the trusted network2 what is the
1 explain the basic technology that makes residentialsoho firewall appliances effective in protecting a local network
1 what is stateful inspection how is state information maintained during a network connection or transaction2 what is a
1 what special function does a cache server perform why is this useful for larger organizations2 describe how the
1 what is a hybrid firewall2 list the five generations of firewall technology which generations are still in common
1 what is radius what advantage does it have over tacacs2 what is a content filter where is it placed in the network to
search the web for security education and training programs in your area keep a list and see which category has the
using a graphics program design several security awareness posters on the following themes updating antivirus
1 if you were setting up an encryption-based network what size key would you choose and why2 what is the average key
1 which security protocols are used to protect e-mail2 ipsec can be used in two modes what are they3 which kind of
1 what drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like diffie hellman2 what
1 how does public-key infrastructure protect information assets2 what are the six components of pki3 what is the
1 what is a hash function and what can it be used for2 why is it important to exchange keys out of band in symmetric
1 what are cryptography and cryptanalysis2 what were some of the first uses of cryptography3 what is a key and what is
using the internet search for commercial idps systems what classification systems and descriptions are used and how can
zonealarm is a pc-based firewall and idps tool visit the product manufacturer at wwwzonelabscom and find the product
a key feature of hybrid idps systems is event correlation after researching event correlation online define the
1 what is a false reject rate what is a false accept rate what is their relationship to the crossover error rate2 what
1 what is a vulnerability scanner how is it used to improve security2 what is the difference between active and passive
1 why do many organizations ban port scanning activities on their internal networks why would isps ban outbound port
1 what is a honeypot how is it different from a honeynet2 how does a padded cell system differ from a honeypot3 what is
1 how does a signature-based idps differ from a behavior-based idps2 what is a monitoring or span port what is it used
1 what common security system is an idps most like in what ways are these systems similar2 how does a false positive