Question

Which of the following is (are) TRUE about Network Security Management? a.It is a type of...

Which of the following is (are) TRUE about Network Security Management?

a.It is a type of preventative measure against network-oriented attacks.

b.It serves as an alternative measure to the Intrusion Detection/Prevention System.

c.It is used to gain visibility into potential attacks with no signature.

d.None of the above.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

(a) It is a type of preventative measure against network-oriented attacks.

Network security management deals with the security related issues of network only, So it can be used as a preventive measure against network-oriented attacks only.

Add a comment
Know the answer?
Add Answer to:
Which of the following is (are) TRUE about Network Security Management? a.It is a type of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 8. Which of the following is true about firewalls and their ability to adapt in a...

    8. Which of the following is true about firewalls and their ability to adapt in a network? a. Firewalls can interpret human actions and make decisions outside their programming. b. Because firewalls are not programmed like a computer, they are less error prone s. Firewalls are flexible and can adapt to new threats aFirewalls deal strictly with defined patterns of measured observation 9 Which of the following is a reason organization use intrusion detection system? To collect data. To deter...

  • Which of the following is (are) NOT a level of Network Security Management methodology? a. Prevention....

    Which of the following is (are) NOT a level of Network Security Management methodology? a. Prevention. b. Detection. c. Analysis. d. Collection.

  • 1-In which type of incident does a person or program, acting on behalf of another person,...

    1-In which type of incident does a person or program, acting on behalf of another person, perform an invalid action? a) Repudiation   b)Identity theft c)Subversion 2-What type of incident forces the victim to pay money to the attacker by threatening to reveal information that could lead to a severe loss for the victim? a) extortion b)harassment c)overpowering 3- Which incident-prevention strategy might involve the review of Internet Security and Acceleration (ISA) Server logs? a)defense-in-depth b)auditing c)scanning   d)detecting intrusions 4-Which of...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Which of the following is NOT true about emergency preparedness and response? The Department of Homeland...

    Which of the following is NOT true about emergency preparedness and response? The Department of Homeland Security has extensive authority and powers related to domestic terrorism and security, including several public health functions. To gain full benefit from the emergency response assets of the federal government, states must develop incident management systems that are interoperable with the National Incident Management System. Emergency preparedness and response are handled by one single federal agency. The Department of Health and Human services and...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • 1. Which of the following statements is true about independent projects? a.Independent projects are projects that, if ac...

    1. Which of the following statements is true about independent projects? a.Independent projects are projects that, if accepted, have to accept one small project to assist other independent projects. b.Independent projects are projects that, if accepted or rejected, do not affect the cash flows of other projects. c.Independent projects are projects that, if accepted, have a negative effect on the company's profit. d.Independent projects are projects that, if accepted or rejected, affect the net profit of other projects. 2. An...

  • 30. Which of the following is not true about the electromagnetic spectrum? a. ultraviolent light (UV)...

    30. Which of the following is not true about the electromagnetic spectrum? a. ultraviolent light (UV) has a shorter wavelength than does visible light b. the energy of a wave is continuous c. the energy of a wave is proportional to the frequency d. The energy of a wave in inversely proportional to the wavelength True/false 31 The shape of a molecule influences the amount of radiation that can be absorbed 32_ __Carbon atom always forms four bonds 33___Water vapor...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT