Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

____7. The most common backup schedule is a daily on-site, incremental or differ

ID: 3622577 • Letter: #

Question




____7. The most common backup schedule is a daily on-site, incremental or differential backup, with a weekly off-site full backup.

____ 8. Remote journaling (RJ) is the transfer of live transactions to an off-site facility. RJ was first developed by IBM in 1999 for its AS/400 – V4R2 operating system.

____ 9. An HIDPS is not capable of monitoring system configuration databases, such as Windows registries.

____ 10. An IDPS is a complex system in that it involves numerous remote-monitoring agents (on both individual systems and networks) that require proper configuration to gain the proper authentication and authorization.



____ 11. If you follow a(n) "____" approach to security, set up application proxy gateways that forward requests on behalf of internal users.
a. Optimistic c. Strict
b. Cautious d. Paranoid


____ 12. A(n) ____ needs to have sufficient processor speed and memory to handle the network's present traffic and increased traffic as the network grows.
a. bastion host c. screening router
b. NAT server d. demilitarized zone


____ 13. Many operating systems perform ____, as do routers.
a. Routing c. IP forwarding
b. packet filtering d. NAT


____ 14. A(n) ____ is an application proxy setup that is connected to the Internet and hosts firewall software.
a. screening router c. multi-firewall DMZ
b. DMZ screened subnet d. dual-homed host


____ 15. In a ____ the host that runs the proxy server software has a single network interface.
a. specialty firewall c. screening router
b. reverse firewall d. screened subnet system

Explanation / Answer

7. The most common backup schedule is a daily on-site, incremental or differential backup, with a weekly off-site full backup.-TRUE

8. Remote journaling (RJ) is the transfer of live transactions to an off-site facility. RJ was first developed by IBM in 1999 for its AS/400 – V4R2 operating system.-TRUE

9. An HIDPS is not capable of monitoring system configuration databases, such as Windows registries.-False

10. An IDPS is a complex system in that it involves numerous remote-monitoring agents (on both individual systems and networks) that require proper configuration to gain the proper authentication and authorization-TRUE