Question

8. Which of the following is true about firewalls and their ability to adapt in a network? a. Firewalls can interpret human a
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:-----------

8. d. Firewalls deal strictly with defined patterns of measured observation

9. d. All of the above

10. c.  Estimate the cost of an attack as soon as possible

11. d.  Protects both the network and host computers

12. d.  Automatically investigating attacks without human intervention

13. d. correction

Add a comment
Know the answer?
Add Answer to:
8. Which of the following is true about firewalls and their ability to adapt in a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Which of the following is (are) TRUE about Network Security Management? a.It is a type of...

    Which of the following is (are) TRUE about Network Security Management? a.It is a type of preventative measure against network-oriented attacks. b.It serves as an alternative measure to the Intrusion Detection/Prevention System. c.It is used to gain visibility into potential attacks with no signature. d.None of the above.

  • Which of the following describes how anomaly desection (used in IDSs and IPSs) works? Qton 15...

    Which of the following describes how anomaly desection (used in IDSs and IPSs) works? Qton 15 Not ye anweed Pots ous of s.0 r lag question Select one: O a. Anomaly detection monitors the activitdies of computer users for signs of corporate espionage or O b. Anomaly detection monitors activities for deviations from normal behavior, which might indicate O c. Anomaly detection compares observed activities to a database of known attacks, watching for insider attacks that an attack is underway...

  • Information Security Exploits flaws in computer systems for nefarious reasons Represents people who use technology as...

    Information Security Exploits flaws in computer systems for nefarious reasons Represents people who use technology as a tool for anarchy Reflects lax attitudes and management failures Protects information and the systems that use, store and transmit it Results from power irregularities and ISP disruptions In an indirect attack approach The criminal breaks into a system using his or her own computer The nefarious message appears to be coming from a trusted source Data traveling over a network is monitored without...

  • Question 1 Which of the following statements about DDoS, reflector, and amplifier attacks is correct? Select...

    Question 1 Which of the following statements about DDoS, reflector, and amplifier attacks is correct? Select all that apply only 3 answers are correct. 1. DDoS attacks often include a network of compromised systems to form a botnet. 2. In reflector attacks, intermediary systems are often chosen to be high-capacity servers to generate high volume of response packets. 3. Both reflector and amplifier attacks require intermediaries with a spoofed source address of the attacker's machine. 4. Common services used in...

  • 1- It is advisable to have more than of form of defence, justify the advantages and...

    1- It is advisable to have more than of form of defence, justify the advantages and disadvantages of that approach? 2- In what case you would recommend a screening router firewall architecture over screened host architecture? 3- You need to implement defence in depth for your entire organization. Your management is interested in deploying intrusion prevention systems. Your goal is to protect. 1) All the traffic flowing through a network 2) Endpoints from intrusions. Analyse the technologies you will be...

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Which of the following is not true of steganalysis? A. It is the process of detecting...

    Which of the following is not true of steganalysis? A. It is the process of detecting messages hidden using steganography. B. It involves separating cover messages from stego messages. C. It often involves the use of statistical properties to look for abnormalities in files. D. It hides secret data within nonsecret data. 2. Which of the following describes a proxy firewall? A. It analyzes traffic as it passes through the applications that it supports. B. It checks only the IP...

  • Attacks: Passive – attempt to learn or make use of information from the system that does...

    Attacks: Passive – attempt to learn or make use of information from the system that does not affect system resources • Active – attempt to alter system resources or affect their operation • Insider – initiated by an entity inside the security parameter • Outsider – initiated from outside the perimeter Threat Consequences Unauthorized disclosure is a threat to confidentiality •Exposure: This can be deliberate or be the result of a human, hardware, or software error •Interception: unauthorized access to...

  • DQuestion 21 4 pts Which of the following statements is true? a) Trojan horses automatically replicate...

    DQuestion 21 4 pts Which of the following statements is true? a) Trojan horses automatically replicate themselves to infect multiple machines across a network b) Viruses are mostly designed to flood networks with excessive traffic and cause congestion O c) Denial of service (DoS) attacks are intended to corrupt/delete program files within a target host system d) Botnet attacks result in coordinated message flooding from multiple compromised hosts D Question 22 4 pts Memory paging schemes a) Are transparent to...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT