Which of the following are additional terms used to des…
Which of the following are additional terms used to describe knowledge-based IDS and behavior-based IDS?
Network-based Intrusion Detection systems:
Network-based Intrusion Detection systems:
A DMZ is also known as a:
A DMZ is also known as a:
The DMZ does not normally contain:
The DMZ does not normally contain:
A DMZ is located:
A DMZ is located:
A demilitarized zone is:
A demilitarized zone is:
When an outgoing request is made on a port number great…
When an outgoing request is made on a port number greater than 1023, this type of firewall creates an ACL to
allow the incoming reply on that port to pass:
In a stateful inspection firewall, data packets are cap…
In a stateful inspection firewall, data packets are captured by an inspection engine that is operating at the:
A circuit level proxy is ____________ when compared to …
A circuit level proxy is ____________ when compared to an application level proxy.
One drawback of Application Level Firewall is that it r…
One drawback of Application Level Firewall is that it reduces network performance due to the fact that it must
analyze every packet and:
