IS477 Unit 7

Your page rank:

Total word count: 401
Pages: 1

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

successful logins

Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?

Control plane and physical plane

What functions of a switch does a software defined network separate?

DNS poisoning

Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?


Which of the following can be used to prevent a buffer overflow attack?

Secure Real-time Transport Protocol (SRTP)

What is the recommended secure protocol for voice and video applications?

resource records

DNSSEC adds additional _____ and message header information, which can be used to verify that the requested data has not been altered in transmission.


Which of these is the most secure protocol for transferring files?

Virtual servers are less expensive than their physical counterparts.

Which of the following is NOT a security concern of virtualized environments?

Hardware as a Service (HaaS)

Which of the following is NOT a service model in cloud computing?


Which version of Simple Network Management Protocol (SNMP) is considered the most secure?


Which application stores the user’s desktop inside a virtual machine that resides on a server and is accessible from multiple locations?

firewall log

Which type of device log contains the most beneficial security data?


Which of the following TCP/IP protocols do not relate to security?

Port mirroring

Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?

event log

Which type of log can provide details regarding requests for specific files on a system?

community cloud

Which type of cloud is offered to specific organizations that have common concerns?

Type I

Which type of hypervisor does not run on an underlying operating system?

It can only handle the SSL protocol

Which of these is NOT correct about an SSL accelerator?


Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?

It can prevent a DNS transfer attack

Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?

Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message