IT Security: Defense against the digital dark arts questions and answers with verified solutions
Why is normalizing log data important in a centralized logging setup? Uniformly formatted logs are easier to store and analyze What type of attacks does a flood guard protect against? Check all that apply. SYN Floods and DDOS Attacks What does DHCP Snooping protect against? Rogue DHCP server attack What does Dynamic ARP Inspection protect against? ARP poisoning attacks What does IP Source Guard protect against? IP spoofing attacks What does EAP-TLS use for mutual authentication of both the server and the client? Digital Certificates Why is it recommended to use both network-based and host-based firewalls? Check all that apply. For protection against hosts on the same network What are some of the weaknesses of the WEP scheme? Check all that apply. small iv pool size use rc4 stream cipher What symmetric encryption algorithm does WPA2 use? AES
Geschreven voor
- Instelling
- IT Security: Defense against the digital dark arts
- Vak
- IT Security: Defense against the digital dark arts
Documentinformatie
- Geüpload op
- 18 augustus 2023
- Aantal pagina's
- 8
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
it security defense against the digital dark arts