__ __ __ __ __ __ __
Category: Answer

 
controla prospective user who, in the context of access _____, seeks to use a protected system, logically access a protected service, or physically enter a protected space11true
informationprocess of attracting attention to a system by placing tantalizing _____ in key locations21true
organization’sresides on a computer or appliance connected to a segment of an _____ network and monitors network traffic on that network segment, looking for indications of ongoing or successful attacks31true
intrusiona process in which a network-based _____ detection prevention system looks for invalid data packets41true
Back hack-Answer: hack into a hacker’s system to find out as much as possible about the hacker60false
defenderstools used by both attackers and _____ to identify or fingerprint the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful informati71true
Packet sniffer-Answer: sometimes called a network protocol analyzer is a network tool that collects copies of packets from the network and analyzes them80false
Padded cellAnswer: - honey pot that has been protected so that it cannot be easily compromised90false
Minutiae-Answer: unique points of reference that are digitized and stored in an encrypted format when the user’s system access credentials are created100false
strategyPartially distributed IDPS control _____110true
Honey netAnswer: - when a collection of honey pots connects several honey pot systems on a subnet120false
technologies)- used to describe current anti-intrusion _____131true
IDPS terrorists-Answer: designed to trip the organization’s IDPS, essentially causing the organization to conduct its own140false
Smart cardAnswer: - contains a computer chip that can verify and validate a number of pieces of information instead of just a PIN150false
Passive mode-Answer: use same connection methods as network-based IDPS160false
instancesthe percentage of identification _____ in which unauthorized users are allowed access to systems or areas as a result of a failure in the biometric device171true
detailedscan networks for highly _____ information181true
Attack protocolAnswer: - a series of steps or processes used by an attacker in a logical sequence to launch an attack against a target system or network190false
Synchronous tokensAnswer: - synchronized with a server, both devices use the same time or a time-based database to generate a number that is displayed and entered during the user login phase200false
Asynchronous tokensAnswer: - use a challenge response system- in which the server challenges the supplicant during login with a numerical sequence210false