Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

41. A ____ requires that a contact person call each and every person on the rost

ID: 3622576 • Letter: 4

Question

41. A ____ requires that a contact person call each and every person on the roster.
a. sequential roster c. response roster
b. hierarchial roser d. strategy roster


____ 42. ____ is the transfer of live transactions to an off-site facility.
a. Remote Journaling c. Bare Metal Recovery
b. Electronic Vaulting d. none of the above


____ 43. A(n) ____ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.
a. intrusion c. reaction
b. detection d. none of the above


____ 44. ____ is the process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS.
a. Evasion c. Noise
b. False attack d. Tuning


____ 45. ____ represents the rules and configuration guidelines governing the implementation and operation of IDPSs within the organization.
a. Site policy c. Tuning
b. Site policy awareness d. Evasion


____ 46. ____ is an IDPS’s ability to dynamically modify its configuration in response to environmental activity.
a. Site policy awareness c. Confidence value
b. Site policy d. Tuning


____ 47. ____ is a value placed upon an IDPS’s ability to detect and identify certain types of attacks correctly.
a. Confidence value c. Tuning
b. Alarm filtering d. Site policy


____ 48. ____ identifies the network services and their software versions offered by the active host systems.
a. Fingerprinting c. Data collection
b. Footprinting d. Evasion


____ 49. ____ systems examine network traffic in order to identify problems related to the flow of traffic.
a. Network Behavior Analysis (NBA) c. WLAN
b. Passive mode d. None of the above


____ 50. ____ are typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
a. Inline sensors c. Outline sensors
b. Passive mode sensors d. None of the above

Explanation / Answer

41. a) Sequential roster 42 a) Remote journaling 43 a) Intrusion 44 a) Evasion 45 a) Site policy 46 a. Site policy awareness 47 a) Confidence value 48 a) Finger printing 49 a) Network Behavior analysis 50 a)Inline Sensors

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote