100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CTI 120 FINAL Security Fundamentals FINAL (1) CA$11.47   Add to cart

Exam (elaborations)

CTI 120 FINAL Security Fundamentals FINAL (1)

 2 views  0 purchase

CTI 120 FINAL Security Fundamentals FINAL (1)

Preview 2 out of 7  pages

  • August 1, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (480)
avatar-seller
modockochieng06
CTI 120 FINAL Security Fundamentals FINAL
IP Sec - ANS-What protocol is used with L2TP to provide encryption?

2.0 - ANS-What stage is the World Wide Web in?

1701 - ANS-What port does L2TP use?

1723 - ANS-What port does PPTP use?

Internet content filter - ANS-What type of firewall do you use to block access to certain websites
or instant messengers?

Intranet - ANS-An _________ is the internal network for an organization.

Packet Filtering - ANS-Which type of firewall blocks packets based on rules that are based on IP
addresses or ports?

back to back configuration - ANS-What type of configuration creates a DMZ between two
firewalls?

NIDS - ANS-What type of device is used to detect malicious network activities and reports only
those issues to the administrator?

PPTP - ANS-Which VPN technology is the most common and the easiest to set up?

Stateful packet inspection - ANS-What technology used in firewalls keeps tracks of
conversations so that it knows what to allow back into a network?

layers - ANS-When trying to protect your network, you should create your secure network based
on _______.

three leg parimeter configuration - ANS-Which DMZ configuration uses one firewall with three
interfaces?

proxy server - ANS-What acts as a middleman that translates between internal and external
addresses and that caches previously accessed web pages so that it can provide those more
quickly in the future?

Firewall - ANS-What device is used to protect one network from another by using filtering
packets?

, NIPS - ANS-What type of device is designed to inspect traffic, detect malicious activities, and
take steps to mitigate the malicious activity?

extranet - ANS-What type of network can you set up that allows another company to access
your internal network?

Internet - ANS-The ____________ is the largest WAN in the world.

VPN - ANS-What technology can you use temporarily to connect networks from two different
companies?

circuit-level gateway - ANS-What type of firewall works on the Session layer that creates a
connection and allows packets to flow between the two hosts without further checking?

confidentiality - ANS-Which of the following terms indicates that information is to be read only by
those people for whom it is intended?

auditing - ANS-What technology is not used to implement confidentiality?

risk mitagation - ANS-In dealing with risks, which response is done by buying insurance to
protect your bottom line if such a disaster or threat is realized?

Money - ANS-What is needed to highly secure a system?

defense in depth - ANS-What is used to provide protection when one line of defense is
breached?

mobile devices - ANS-Over the last couple of years, small ___________________ devices have
been become one of the largest challenges facing security professionals.

availability - ANS-What does the initial A in CIA stand for in relation to security?

removable devices - ANS-What type of device can be easily lost or stolen or can be used for
espionage?

Principle of Least Privilidge - ANS-What do you call the security discipline that requires that a
user is given no more privilege necessary to perform his or her job?

Auditing - ANS-What is used to verify that an administrator is not accessing data that he should
not be accessing?

keylogger - ANS-What is a physical or logical device used to capture keystrokes?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller modockochieng06. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$11.47. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$11.47
  • (0)
  Add to cart