Match each item with a statement below.

A. Records session-specific information about a network connection
B. IDS systems that don't take any action to stop or prevent an activity
C. Internal private IP addresses are mapped to public external IP addresses hiding the internal infrastructure
D. Small network containing resources that a company wants to make available to Internet users and helps maintain security
E. Handle each packet separately and are not resistant to spoofing or DoS attacks
F. Administrator can perform basic troubleshooting tests and list information stored on the router
G. Administrator can perform full router configuration tasks
H. Indicates that a system or network has been hacked
I. IDS systems log events and send alerts, but they can also interoperate with routers and firewalls to stop an attack
J. Inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection


A. stateful packet filter
B. passive systems
C. NAT
D. DMZ
E. stateless packet filter
F. user mode
G. privileged mode
H. indicators of compromise
I. active systems
J. application-aware firewall

Computer Science & Information Technology

You might also like to view...

Without this statement appearing in a switch construct, the program "falls through" all of the statements below the one with the matching case expression.

a. break b. exit c. switch d. scope e. None of these

Computer Science & Information Technology

FTTH uses fiber-optic cables

Indicate whether the statement is true or false

Computer Science & Information Technology

To use a graphical image in a Word document, the image must be stored digitally in a file.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To delete an incorrect character in a document, simply click next to the incorrect character and then press the ____ key(s) to erase to the right of the insertion point.

A. CTRL+HOME B. DELETE C. BACKSPACE D. END

Computer Science & Information Technology