Create an account
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners.
A basic level of security can be achieved through using the security features found in network hardware.
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
_____ are combination locks that use buttons which must be pushed in the proper sequence to open the door
B. Cipher locks
______ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
C. Tailgate sensors
Instead of using a key or entering a code to open a door, a user can display a _____ to identify herself.
C. Physical token
ID Badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together