Front | Back |
A technician should not be concerned about _____ when implementing a new
wireless network.
|
80211 mode
|
The _____ is a list of permissions attached to an object.
|
ACL
|
Using the _____, an administrator can restrict network access to certain ports
enterprise wide.
|
ACL
|
_____ is used for mapping an IP address to a physical machine address so that
it is recognized in the local network.
|
Address Resolution Protocol (ARP)
|
_____ discovers the MAC address of a device from the IP
address
|
Address Resolution Protocol (ARP)
|
_____ is a type of attack that sends out numerous MAC resolution requests to
create a buffer overflow
attack.
|
ARP Poisoning
|
_____ is decrypted in the least amount of time
|
AES
|
_____ is the most secure with the least CPU utilization, can be used for
credit cards.
|
AES
|
_____is the most recent addition to cryptography
|
AES
|
An _____ allows for a fast, highly secure encryption of a USB flash drive.
|
AES256
|
_____ with _____ allows for a high level of encryption.
|
AES and ECC
|
_____ is the most mathematically secure encryption for a file.
|
AES256
|
The best time to update antivirus definitions is ....
|
As soon as they become available from the vendor.
|
_____ software products detect malware by comparing the characteristics of
known instances against
signature file sets.
|
Antivirus
|
_____ products most important security considerations are the frequency of
signature updates, and the
number of viruses the software can detect.
|
Antivirus
|